Compare commits
28 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| e1f5d73e03 | |||
| 19fd6d59d2 | |||
| e3988b339f | |||
| 336948a397 | |||
| 50ae422de8 | |||
| 8467ed555e | |||
| 01ddc76f7e | |||
| ffb3565ff5 | |||
| 6d700ef6dd | |||
| b8acb6da4c | |||
| 6b4127f0ef | |||
| 16d48ff906 | |||
| 6213ff8a30 | |||
| 4ffaec9d9a | |||
| 6de0a618ee | |||
| 8cc70fa45e | |||
| d666ae5545 | |||
| 5edb3c8086 | |||
| 5b603d8317 | |||
| 5ceade81db | |||
| 8fd9f8b567 | |||
| 30e84ac3b7 | |||
| fd6ffc2500 | |||
| e1cd4ed981 | |||
| 96d2b88f95 | |||
| 8a456d2cde | |||
| 8841230653 | |||
| 4d0a7deaf2 |
@@ -1,20 +0,0 @@
|
|||||||
on:
|
|
||||||
push:
|
|
||||||
pull_request:
|
|
||||||
types: [opened, synchronize, reopened]
|
|
||||||
|
|
||||||
name: SonarQube Scan
|
|
||||||
jobs:
|
|
||||||
sonarqube:
|
|
||||||
name: SonarQube Trigger
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- name: Checking out
|
|
||||||
uses: actions/checkout@v6
|
|
||||||
with:
|
|
||||||
fetch-depth: 0
|
|
||||||
- name: SonarQube Scan
|
|
||||||
uses: SonarSource/sonarqube-scan-action@v7.0.0
|
|
||||||
env:
|
|
||||||
SONAR_HOST_URL: ${{ secrets.SONARQUBE_HOST }}
|
|
||||||
SONAR_TOKEN: ${{ secrets.SONARQUBE_TOKEN }}
|
|
||||||
+1
-1
@@ -1,4 +1,4 @@
|
|||||||
FROM golang:1.25.6-alpine AS go_builder
|
FROM golang:1.25.5-alpine AS go_builder
|
||||||
|
|
||||||
ARG VERSION=dev
|
ARG VERSION=dev
|
||||||
ARG BUILD_DATE=unknown
|
ARG BUILD_DATE=unknown
|
||||||
|
|||||||
@@ -11,7 +11,7 @@ require (
|
|||||||
github.com/joho/godotenv v1.5.1
|
github.com/joho/godotenv v1.5.1
|
||||||
github.com/libdns/cloudflare v0.2.2
|
github.com/libdns/cloudflare v0.2.2
|
||||||
github.com/muesli/termenv v0.16.0
|
github.com/muesli/termenv v0.16.0
|
||||||
golang.org/x/crypto v0.47.0
|
golang.org/x/crypto v0.46.0
|
||||||
google.golang.org/grpc v1.78.0
|
google.golang.org/grpc v1.78.0
|
||||||
google.golang.org/protobuf v1.36.11
|
google.golang.org/protobuf v1.36.11
|
||||||
)
|
)
|
||||||
@@ -48,8 +48,8 @@ require (
|
|||||||
golang.org/x/mod v0.31.0 // indirect
|
golang.org/x/mod v0.31.0 // indirect
|
||||||
golang.org/x/net v0.48.0 // indirect
|
golang.org/x/net v0.48.0 // indirect
|
||||||
golang.org/x/sync v0.19.0 // indirect
|
golang.org/x/sync v0.19.0 // indirect
|
||||||
golang.org/x/sys v0.40.0 // indirect
|
golang.org/x/sys v0.39.0 // indirect
|
||||||
golang.org/x/text v0.33.0 // indirect
|
golang.org/x/text v0.32.0 // indirect
|
||||||
golang.org/x/tools v0.40.0 // indirect
|
golang.org/x/tools v0.40.0 // indirect
|
||||||
google.golang.org/genproto/googleapis/rpc v0.0.0-20251222181119-0a764e51fe1b // indirect
|
google.golang.org/genproto/googleapis/rpc v0.0.0-20251222181119-0a764e51fe1b // indirect
|
||||||
)
|
)
|
||||||
|
|||||||
@@ -1,3 +1,7 @@
|
|||||||
|
git.fossy.my.id/bagas/tunnel-please-grpc v1.3.0 h1:RhcBKUG41/om4jgN+iF/vlY/RojTeX1QhBa4p4428ec=
|
||||||
|
git.fossy.my.id/bagas/tunnel-please-grpc v1.3.0/go.mod h1:fG+VkArdkceGB0bNA7IFQus9GetLAwdF5Oi4jdMlXtY=
|
||||||
|
git.fossy.my.id/bagas/tunnel-please-grpc v1.4.0 h1:tpJSKjaSmV+vxxbVx6qnStjxFVXjj2M0rygWXxLb99o=
|
||||||
|
git.fossy.my.id/bagas/tunnel-please-grpc v1.4.0/go.mod h1:fG+VkArdkceGB0bNA7IFQus9GetLAwdF5Oi4jdMlXtY=
|
||||||
git.fossy.my.id/bagas/tunnel-please-grpc v1.5.0 h1:3xszIhck4wo9CoeRq9vnkar4PhY7kz9QrR30qj2XszA=
|
git.fossy.my.id/bagas/tunnel-please-grpc v1.5.0 h1:3xszIhck4wo9CoeRq9vnkar4PhY7kz9QrR30qj2XszA=
|
||||||
git.fossy.my.id/bagas/tunnel-please-grpc v1.5.0/go.mod h1:Weh6ZujgWmT8XxD3Qba7sJ6r5eyUMB9XSWynqdyOoLo=
|
git.fossy.my.id/bagas/tunnel-please-grpc v1.5.0/go.mod h1:Weh6ZujgWmT8XxD3Qba7sJ6r5eyUMB9XSWynqdyOoLo=
|
||||||
github.com/atotto/clipboard v0.1.4 h1:EH0zSVneZPSuFR11BlR9YppQTVDbh5+16AmcJi4g1z4=
|
github.com/atotto/clipboard v0.1.4 h1:EH0zSVneZPSuFR11BlR9YppQTVDbh5+16AmcJi4g1z4=
|
||||||
@@ -6,8 +10,12 @@ github.com/aymanbagabas/go-osc52/v2 v2.0.1 h1:HwpRHbFMcZLEVr42D4p7XBqjyuxQH5SMiE
|
|||||||
github.com/aymanbagabas/go-osc52/v2 v2.0.1/go.mod h1:uYgXzlJ7ZpABp8OJ+exZzJJhRNQ2ASbcXHWsFqH8hp8=
|
github.com/aymanbagabas/go-osc52/v2 v2.0.1/go.mod h1:uYgXzlJ7ZpABp8OJ+exZzJJhRNQ2ASbcXHWsFqH8hp8=
|
||||||
github.com/aymanbagabas/go-udiff v0.2.0 h1:TK0fH4MteXUDspT88n8CKzvK0X9O2xu9yQjWpi6yML8=
|
github.com/aymanbagabas/go-udiff v0.2.0 h1:TK0fH4MteXUDspT88n8CKzvK0X9O2xu9yQjWpi6yML8=
|
||||||
github.com/aymanbagabas/go-udiff v0.2.0/go.mod h1:RE4Ex0qsGkTAJoQdQQCA0uG+nAzJO/pI/QwceO5fgrA=
|
github.com/aymanbagabas/go-udiff v0.2.0/go.mod h1:RE4Ex0qsGkTAJoQdQQCA0uG+nAzJO/pI/QwceO5fgrA=
|
||||||
|
github.com/caddyserver/certmagic v0.25.0 h1:VMleO/XA48gEWes5l+Fh6tRWo9bHkhwAEhx63i+F5ic=
|
||||||
|
github.com/caddyserver/certmagic v0.25.0/go.mod h1:m9yB7Mud24OQbPHOiipAoyKPn9pKHhpSJxXR1jydBxA=
|
||||||
github.com/caddyserver/certmagic v0.25.1 h1:4sIKKbOt5pg6+sL7tEwymE1x2bj6CHr80da1CRRIPbY=
|
github.com/caddyserver/certmagic v0.25.1 h1:4sIKKbOt5pg6+sL7tEwymE1x2bj6CHr80da1CRRIPbY=
|
||||||
github.com/caddyserver/certmagic v0.25.1/go.mod h1:VhyvndxtVton/Fo/wKhRoC46Rbw1fmjvQ3GjHYSQTEY=
|
github.com/caddyserver/certmagic v0.25.1/go.mod h1:VhyvndxtVton/Fo/wKhRoC46Rbw1fmjvQ3GjHYSQTEY=
|
||||||
|
github.com/caddyserver/zerossl v0.1.3 h1:onS+pxp3M8HnHpN5MMbOMyNjmTheJyWRaZYwn+YTAyA=
|
||||||
|
github.com/caddyserver/zerossl v0.1.3/go.mod h1:CxA0acn7oEGO6//4rtrRjYgEoa4MFw/XofZnrYwGqG4=
|
||||||
github.com/caddyserver/zerossl v0.1.4 h1:CVJOE3MZeFisCERZjkxIcsqIH4fnFdlYWnPYeFtBHRw=
|
github.com/caddyserver/zerossl v0.1.4 h1:CVJOE3MZeFisCERZjkxIcsqIH4fnFdlYWnPYeFtBHRw=
|
||||||
github.com/caddyserver/zerossl v0.1.4/go.mod h1:CxA0acn7oEGO6//4rtrRjYgEoa4MFw/XofZnrYwGqG4=
|
github.com/caddyserver/zerossl v0.1.4/go.mod h1:CxA0acn7oEGO6//4rtrRjYgEoa4MFw/XofZnrYwGqG4=
|
||||||
github.com/charmbracelet/bubbles v0.21.0 h1:9TdC97SdRVg/1aaXNVWfFH3nnLAwOXr8Fn6u6mfQdFs=
|
github.com/charmbracelet/bubbles v0.21.0 h1:9TdC97SdRVg/1aaXNVWfFH3nnLAwOXr8Fn6u6mfQdFs=
|
||||||
@@ -110,8 +118,8 @@ go.uber.org/zap v1.27.1 h1:08RqriUEv8+ArZRYSTXy1LeBScaMpVSTBhCeaZYfMYc=
|
|||||||
go.uber.org/zap v1.27.1/go.mod h1:GB2qFLM7cTU87MWRP2mPIjqfIDnGu+VIO4V/SdhGo2E=
|
go.uber.org/zap v1.27.1/go.mod h1:GB2qFLM7cTU87MWRP2mPIjqfIDnGu+VIO4V/SdhGo2E=
|
||||||
go.uber.org/zap/exp v0.3.0 h1:6JYzdifzYkGmTdRR59oYH+Ng7k49H9qVpWwNSsGJj3U=
|
go.uber.org/zap/exp v0.3.0 h1:6JYzdifzYkGmTdRR59oYH+Ng7k49H9qVpWwNSsGJj3U=
|
||||||
go.uber.org/zap/exp v0.3.0/go.mod h1:5I384qq7XGxYyByIhHm6jg5CHkGY0nsTfbDLgDDlgJQ=
|
go.uber.org/zap/exp v0.3.0/go.mod h1:5I384qq7XGxYyByIhHm6jg5CHkGY0nsTfbDLgDDlgJQ=
|
||||||
golang.org/x/crypto v0.47.0 h1:V6e3FRj+n4dbpw86FJ8Fv7XVOql7TEwpHapKoMJ/GO8=
|
golang.org/x/crypto v0.46.0 h1:cKRW/pmt1pKAfetfu+RCEvjvZkA9RimPbh7bhFjGVBU=
|
||||||
golang.org/x/crypto v0.47.0/go.mod h1:ff3Y9VzzKbwSSEzWqJsJVBnWmRwRSHt/6Op5n9bQc4A=
|
golang.org/x/crypto v0.46.0/go.mod h1:Evb/oLKmMraqjZ2iQTwDwvCtJkczlDuTmdJXoZVzqU0=
|
||||||
golang.org/x/exp v0.0.0-20231006140011-7918f672742d h1:jtJma62tbqLibJ5sFQz8bKtEM8rJBtfilJ2qTU199MI=
|
golang.org/x/exp v0.0.0-20231006140011-7918f672742d h1:jtJma62tbqLibJ5sFQz8bKtEM8rJBtfilJ2qTU199MI=
|
||||||
golang.org/x/exp v0.0.0-20231006140011-7918f672742d/go.mod h1:ldy0pHrwJyGW56pPQzzkH36rKxoZW1tw7ZJpeKx+hdo=
|
golang.org/x/exp v0.0.0-20231006140011-7918f672742d/go.mod h1:ldy0pHrwJyGW56pPQzzkH36rKxoZW1tw7ZJpeKx+hdo=
|
||||||
golang.org/x/mod v0.31.0 h1:HaW9xtz0+kOcWKwli0ZXy79Ix+UW/vOfmWI5QVd2tgI=
|
golang.org/x/mod v0.31.0 h1:HaW9xtz0+kOcWKwli0ZXy79Ix+UW/vOfmWI5QVd2tgI=
|
||||||
@@ -122,12 +130,12 @@ golang.org/x/sync v0.19.0 h1:vV+1eWNmZ5geRlYjzm2adRgW2/mcpevXNg50YZtPCE4=
|
|||||||
golang.org/x/sync v0.19.0/go.mod h1:9KTHXmSnoGruLpwFjVSX0lNNA75CykiMECbovNTZqGI=
|
golang.org/x/sync v0.19.0/go.mod h1:9KTHXmSnoGruLpwFjVSX0lNNA75CykiMECbovNTZqGI=
|
||||||
golang.org/x/sys v0.0.0-20210809222454-d867a43fc93e/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20210809222454-d867a43fc93e/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.40.0 h1:DBZZqJ2Rkml6QMQsZywtnjnnGvHza6BTfYFWY9kjEWQ=
|
golang.org/x/sys v0.39.0 h1:CvCKL8MeisomCi6qNZ+wbb0DN9E5AATixKsvNtMoMFk=
|
||||||
golang.org/x/sys v0.40.0/go.mod h1:OgkHotnGiDImocRcuBABYBEXf8A9a87e/uXjp9XT3ks=
|
golang.org/x/sys v0.39.0/go.mod h1:OgkHotnGiDImocRcuBABYBEXf8A9a87e/uXjp9XT3ks=
|
||||||
golang.org/x/term v0.39.0 h1:RclSuaJf32jOqZz74CkPA9qFuVTX7vhLlpfj/IGWlqY=
|
golang.org/x/term v0.38.0 h1:PQ5pkm/rLO6HnxFR7N2lJHOZX6Kez5Y1gDSJla6jo7Q=
|
||||||
golang.org/x/term v0.39.0/go.mod h1:yxzUCTP/U+FzoxfdKmLaA0RV1WgE0VY7hXBwKtY/4ww=
|
golang.org/x/term v0.38.0/go.mod h1:bSEAKrOT1W+VSu9TSCMtoGEOUcKxOKgl3LE5QEF/xVg=
|
||||||
golang.org/x/text v0.33.0 h1:B3njUFyqtHDUI5jMn1YIr5B0IE2U0qck04r6d4KPAxE=
|
golang.org/x/text v0.32.0 h1:ZD01bjUt1FQ9WJ0ClOL5vxgxOI/sVCNgX1YtKwcY0mU=
|
||||||
golang.org/x/text v0.33.0/go.mod h1:LuMebE6+rBincTi9+xWTY8TztLzKHc/9C1uBCG27+q8=
|
golang.org/x/text v0.32.0/go.mod h1:o/rUWzghvpD5TXrTIBuJU77MTaN0ljMWE47kxGJQ7jY=
|
||||||
golang.org/x/tools v0.40.0 h1:yLkxfA+Qnul4cs9QA3KnlFu0lVmd8JJfoq+E41uSutA=
|
golang.org/x/tools v0.40.0 h1:yLkxfA+Qnul4cs9QA3KnlFu0lVmd8JJfoq+E41uSutA=
|
||||||
golang.org/x/tools v0.40.0/go.mod h1:Ik/tzLRlbscWpqqMRjyWYDisX8bG13FrdXp3o4Sr9lc=
|
golang.org/x/tools v0.40.0/go.mod h1:Ik/tzLRlbscWpqqMRjyWYDisX8bG13FrdXp3o4Sr9lc=
|
||||||
gonum.org/v1/gonum v0.16.0 h1:5+ul4Swaf3ESvrOnidPp4GZbzf0mxVQpDCYUQE7OJfk=
|
gonum.org/v1/gonum v0.16.0 h1:5+ul4Swaf3ESvrOnidPp4GZbzf0mxVQpDCYUQE7OJfk=
|
||||||
|
|||||||
+25
-53
@@ -1,63 +1,35 @@
|
|||||||
package config
|
package config
|
||||||
|
|
||||||
import "tunnel_pls/types"
|
import (
|
||||||
|
"log"
|
||||||
|
"os"
|
||||||
|
"strconv"
|
||||||
|
|
||||||
type Config interface {
|
"github.com/joho/godotenv"
|
||||||
Domain() string
|
)
|
||||||
SSHPort() string
|
|
||||||
|
|
||||||
HTTPPort() string
|
func init() {
|
||||||
HTTPSPort() string
|
if _, err := os.Stat(".env"); err == nil {
|
||||||
|
if err := godotenv.Load(".env"); err != nil {
|
||||||
TLSEnabled() bool
|
log.Printf("Warning: Failed to load .env file: %s", err)
|
||||||
TLSRedirect() bool
|
}
|
||||||
|
}
|
||||||
ACMEEmail() string
|
|
||||||
CFAPIToken() string
|
|
||||||
ACMEStaging() bool
|
|
||||||
|
|
||||||
AllowedPortsStart() uint16
|
|
||||||
AllowedPortsEnd() uint16
|
|
||||||
|
|
||||||
BufferSize() int
|
|
||||||
|
|
||||||
PprofEnabled() bool
|
|
||||||
PprofPort() string
|
|
||||||
|
|
||||||
Mode() types.ServerMode
|
|
||||||
GRPCAddress() string
|
|
||||||
GRPCPort() string
|
|
||||||
NodeToken() string
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func MustLoad() (Config, error) {
|
func Getenv(key, defaultValue string) string {
|
||||||
if err := loadEnvFile(); err != nil {
|
val := os.Getenv(key)
|
||||||
return nil, err
|
if val == "" {
|
||||||
|
val = defaultValue
|
||||||
}
|
}
|
||||||
|
|
||||||
cfg, err := parse()
|
return val
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
return cfg, nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *config) Domain() string { return c.domain }
|
func GetBufferSize() int {
|
||||||
func (c *config) SSHPort() string { return c.sshPort }
|
sizeStr := Getenv("BUFFER_SIZE", "32768")
|
||||||
func (c *config) HTTPPort() string { return c.httpPort }
|
size, err := strconv.Atoi(sizeStr)
|
||||||
func (c *config) HTTPSPort() string { return c.httpsPort }
|
if err != nil || size < 4096 || size > 1048576 {
|
||||||
func (c *config) TLSEnabled() bool { return c.tlsEnabled }
|
return 32768
|
||||||
func (c *config) TLSRedirect() bool { return c.tlsRedirect }
|
}
|
||||||
func (c *config) ACMEEmail() string { return c.acmeEmail }
|
return size
|
||||||
func (c *config) CFAPIToken() string { return c.cfAPIToken }
|
}
|
||||||
func (c *config) ACMEStaging() bool { return c.acmeStaging }
|
|
||||||
func (c *config) AllowedPortsStart() uint16 { return c.allowedPortsStart }
|
|
||||||
func (c *config) AllowedPortsEnd() uint16 { return c.allowedPortsEnd }
|
|
||||||
func (c *config) BufferSize() int { return c.bufferSize }
|
|
||||||
func (c *config) PprofEnabled() bool { return c.pprofEnabled }
|
|
||||||
func (c *config) PprofPort() string { return c.pprofPort }
|
|
||||||
func (c *config) Mode() types.ServerMode { return c.mode }
|
|
||||||
func (c *config) GRPCAddress() string { return c.grpcAddress }
|
|
||||||
func (c *config) GRPCPort() string { return c.grpcPort }
|
|
||||||
func (c *config) NodeToken() string { return c.nodeToken }
|
|
||||||
|
|||||||
@@ -1,170 +0,0 @@
|
|||||||
package config
|
|
||||||
|
|
||||||
import (
|
|
||||||
"fmt"
|
|
||||||
"log"
|
|
||||||
"os"
|
|
||||||
"strconv"
|
|
||||||
"strings"
|
|
||||||
"tunnel_pls/types"
|
|
||||||
|
|
||||||
"github.com/joho/godotenv"
|
|
||||||
)
|
|
||||||
|
|
||||||
type config struct {
|
|
||||||
domain string
|
|
||||||
sshPort string
|
|
||||||
|
|
||||||
httpPort string
|
|
||||||
httpsPort string
|
|
||||||
|
|
||||||
tlsEnabled bool
|
|
||||||
tlsRedirect bool
|
|
||||||
|
|
||||||
acmeEmail string
|
|
||||||
cfAPIToken string
|
|
||||||
acmeStaging bool
|
|
||||||
|
|
||||||
allowedPortsStart uint16
|
|
||||||
allowedPortsEnd uint16
|
|
||||||
|
|
||||||
bufferSize int
|
|
||||||
|
|
||||||
pprofEnabled bool
|
|
||||||
pprofPort string
|
|
||||||
|
|
||||||
mode types.ServerMode
|
|
||||||
grpcAddress string
|
|
||||||
grpcPort string
|
|
||||||
nodeToken string
|
|
||||||
}
|
|
||||||
|
|
||||||
func parse() (*config, error) {
|
|
||||||
mode, err := parseMode()
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
domain := getenv("DOMAIN", "localhost")
|
|
||||||
sshPort := getenv("PORT", "2200")
|
|
||||||
|
|
||||||
httpPort := getenv("HTTP_PORT", "8080")
|
|
||||||
httpsPort := getenv("HTTPS_PORT", "8443")
|
|
||||||
|
|
||||||
tlsEnabled := getenvBool("TLS_ENABLED", false)
|
|
||||||
tlsRedirect := tlsEnabled && getenvBool("TLS_REDIRECT", false)
|
|
||||||
|
|
||||||
acmeEmail := getenv("ACME_EMAIL", "admin@"+domain)
|
|
||||||
acmeStaging := getenvBool("ACME_STAGING", false)
|
|
||||||
|
|
||||||
cfToken := getenv("CF_API_TOKEN", "")
|
|
||||||
if tlsEnabled && cfToken == "" {
|
|
||||||
return nil, fmt.Errorf("CF_API_TOKEN is required when TLS is enabled")
|
|
||||||
}
|
|
||||||
|
|
||||||
start, end, err := parseAllowedPorts()
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
bufferSize := parseBufferSize()
|
|
||||||
|
|
||||||
pprofEnabled := getenvBool("PPROF_ENABLED", false)
|
|
||||||
pprofPort := getenv("PPROF_PORT", "6060")
|
|
||||||
|
|
||||||
grpcHost := getenv("GRPC_ADDRESS", "localhost")
|
|
||||||
grpcPort := getenv("GRPC_PORT", "8080")
|
|
||||||
|
|
||||||
nodeToken := getenv("NODE_TOKEN", "")
|
|
||||||
if mode == types.ServerModeNODE && nodeToken == "" {
|
|
||||||
return nil, fmt.Errorf("NODE_TOKEN is required in node mode")
|
|
||||||
}
|
|
||||||
|
|
||||||
return &config{
|
|
||||||
domain: domain,
|
|
||||||
sshPort: sshPort,
|
|
||||||
httpPort: httpPort,
|
|
||||||
httpsPort: httpsPort,
|
|
||||||
tlsEnabled: tlsEnabled,
|
|
||||||
tlsRedirect: tlsRedirect,
|
|
||||||
acmeEmail: acmeEmail,
|
|
||||||
cfAPIToken: cfToken,
|
|
||||||
acmeStaging: acmeStaging,
|
|
||||||
allowedPortsStart: start,
|
|
||||||
allowedPortsEnd: end,
|
|
||||||
bufferSize: bufferSize,
|
|
||||||
pprofEnabled: pprofEnabled,
|
|
||||||
pprofPort: pprofPort,
|
|
||||||
mode: mode,
|
|
||||||
grpcAddress: grpcHost,
|
|
||||||
grpcPort: grpcPort,
|
|
||||||
nodeToken: nodeToken,
|
|
||||||
}, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func loadEnvFile() error {
|
|
||||||
if _, err := os.Stat(".env"); err == nil {
|
|
||||||
return godotenv.Load(".env")
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func parseMode() (types.ServerMode, error) {
|
|
||||||
switch strings.ToLower(getenv("MODE", "standalone")) {
|
|
||||||
case "standalone":
|
|
||||||
return types.ServerModeSTANDALONE, nil
|
|
||||||
case "node":
|
|
||||||
return types.ServerModeNODE, nil
|
|
||||||
default:
|
|
||||||
return 0, fmt.Errorf("invalid MODE value")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func parseAllowedPorts() (uint16, uint16, error) {
|
|
||||||
raw := getenv("ALLOWED_PORTS", "")
|
|
||||||
if raw == "" {
|
|
||||||
return 0, 0, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
parts := strings.Split(raw, "-")
|
|
||||||
if len(parts) != 2 {
|
|
||||||
return 0, 0, fmt.Errorf("invalid ALLOWED_PORTS format")
|
|
||||||
}
|
|
||||||
|
|
||||||
start, err := strconv.ParseUint(parts[0], 10, 16)
|
|
||||||
if err != nil {
|
|
||||||
return 0, 0, err
|
|
||||||
}
|
|
||||||
|
|
||||||
end, err := strconv.ParseUint(parts[1], 10, 16)
|
|
||||||
if err != nil {
|
|
||||||
return 0, 0, err
|
|
||||||
}
|
|
||||||
|
|
||||||
return uint16(start), uint16(end), nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func parseBufferSize() int {
|
|
||||||
raw := getenv("BUFFER_SIZE", "32768")
|
|
||||||
size, err := strconv.Atoi(raw)
|
|
||||||
if err != nil || size < 4096 || size > 1048576 {
|
|
||||||
log.Println("Invalid BUFFER_SIZE, falling back to 4096")
|
|
||||||
return 4096
|
|
||||||
}
|
|
||||||
return size
|
|
||||||
}
|
|
||||||
|
|
||||||
func getenv(key, def string) string {
|
|
||||||
if v := os.Getenv(key); v != "" {
|
|
||||||
return v
|
|
||||||
}
|
|
||||||
return def
|
|
||||||
}
|
|
||||||
|
|
||||||
func getenvBool(key string, def bool) bool {
|
|
||||||
val := os.Getenv(key)
|
|
||||||
if val == "" {
|
|
||||||
return def
|
|
||||||
}
|
|
||||||
return val == "true"
|
|
||||||
}
|
|
||||||
+105
-51
@@ -2,18 +2,21 @@ package client
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"crypto/tls"
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
"log"
|
"log"
|
||||||
"time"
|
"time"
|
||||||
"tunnel_pls/internal/config"
|
"tunnel_pls/internal/config"
|
||||||
"tunnel_pls/internal/registry"
|
|
||||||
"tunnel_pls/types"
|
"tunnel_pls/types"
|
||||||
|
|
||||||
|
"tunnel_pls/session"
|
||||||
|
|
||||||
proto "git.fossy.my.id/bagas/tunnel-please-grpc/gen"
|
proto "git.fossy.my.id/bagas/tunnel-please-grpc/gen"
|
||||||
"google.golang.org/grpc"
|
"google.golang.org/grpc"
|
||||||
"google.golang.org/grpc/codes"
|
"google.golang.org/grpc/codes"
|
||||||
|
"google.golang.org/grpc/credentials"
|
||||||
"google.golang.org/grpc/credentials/insecure"
|
"google.golang.org/grpc/credentials/insecure"
|
||||||
"google.golang.org/grpc/health/grpc_health_v1"
|
"google.golang.org/grpc/health/grpc_health_v1"
|
||||||
"google.golang.org/grpc/keepalive"
|
"google.golang.org/grpc/keepalive"
|
||||||
@@ -21,35 +24,83 @@ import (
|
|||||||
"google.golang.org/protobuf/types/known/timestamppb"
|
"google.golang.org/protobuf/types/known/timestamppb"
|
||||||
)
|
)
|
||||||
|
|
||||||
type Client interface {
|
type GrpcConfig struct {
|
||||||
SubscribeEvents(ctx context.Context, identity, authToken string) error
|
Address string
|
||||||
ClientConn() *grpc.ClientConn
|
UseTLS bool
|
||||||
AuthorizeConn(ctx context.Context, token string) (authorized bool, user string, err error)
|
InsecureSkipVerify bool
|
||||||
Close() error
|
Timeout time.Duration
|
||||||
CheckServerHealth(ctx context.Context) error
|
KeepAlive bool
|
||||||
|
MaxRetries int
|
||||||
|
KeepAliveTime time.Duration
|
||||||
|
KeepAliveTimeout time.Duration
|
||||||
|
PermitWithoutStream bool
|
||||||
}
|
}
|
||||||
type client struct {
|
|
||||||
config config.Config
|
type Client struct {
|
||||||
conn *grpc.ClientConn
|
conn *grpc.ClientConn
|
||||||
address string
|
config *GrpcConfig
|
||||||
sessionRegistry registry.Registry
|
sessionRegistry session.Registry
|
||||||
eventService proto.EventServiceClient
|
eventService proto.EventServiceClient
|
||||||
authorizeConnectionService proto.UserServiceClient
|
authorizeConnectionService proto.UserServiceClient
|
||||||
closing bool
|
closing bool
|
||||||
}
|
}
|
||||||
|
|
||||||
func New(config config.Config, address string, sessionRegistry registry.Registry) (Client, error) {
|
func DefaultConfig() *GrpcConfig {
|
||||||
var opts []grpc.DialOption
|
return &GrpcConfig{
|
||||||
|
Address: "localhost:50051",
|
||||||
opts = append(opts, grpc.WithTransportCredentials(insecure.NewCredentials()))
|
UseTLS: false,
|
||||||
|
InsecureSkipVerify: false,
|
||||||
kaParams := keepalive.ClientParameters{
|
|
||||||
Time: 2 * time.Minute,
|
|
||||||
Timeout: 10 * time.Second,
|
Timeout: 10 * time.Second,
|
||||||
|
KeepAlive: true,
|
||||||
|
MaxRetries: 3,
|
||||||
|
KeepAliveTime: 2 * time.Minute,
|
||||||
|
KeepAliveTimeout: 10 * time.Second,
|
||||||
PermitWithoutStream: false,
|
PermitWithoutStream: false,
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func New(config *GrpcConfig, sessionRegistry session.Registry) (*Client, error) {
|
||||||
|
if config == nil {
|
||||||
|
config = DefaultConfig()
|
||||||
|
} else {
|
||||||
|
defaults := DefaultConfig()
|
||||||
|
if config.Address == "" {
|
||||||
|
config.Address = defaults.Address
|
||||||
|
}
|
||||||
|
if config.Timeout == 0 {
|
||||||
|
config.Timeout = defaults.Timeout
|
||||||
|
}
|
||||||
|
if config.MaxRetries == 0 {
|
||||||
|
config.MaxRetries = defaults.MaxRetries
|
||||||
|
}
|
||||||
|
if config.KeepAliveTime == 0 {
|
||||||
|
config.KeepAliveTime = defaults.KeepAliveTime
|
||||||
|
}
|
||||||
|
if config.KeepAliveTimeout == 0 {
|
||||||
|
config.KeepAliveTimeout = defaults.KeepAliveTimeout
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
var opts []grpc.DialOption
|
||||||
|
|
||||||
|
if config.UseTLS {
|
||||||
|
tlsConfig := &tls.Config{
|
||||||
|
InsecureSkipVerify: config.InsecureSkipVerify,
|
||||||
|
}
|
||||||
|
creds := credentials.NewTLS(tlsConfig)
|
||||||
|
opts = append(opts, grpc.WithTransportCredentials(creds))
|
||||||
|
} else {
|
||||||
|
opts = append(opts, grpc.WithTransportCredentials(insecure.NewCredentials()))
|
||||||
|
}
|
||||||
|
|
||||||
|
if config.KeepAlive {
|
||||||
|
kaParams := keepalive.ClientParameters{
|
||||||
|
Time: config.KeepAliveTime,
|
||||||
|
Timeout: config.KeepAliveTimeout,
|
||||||
|
PermitWithoutStream: config.PermitWithoutStream,
|
||||||
|
}
|
||||||
opts = append(opts, grpc.WithKeepaliveParams(kaParams))
|
opts = append(opts, grpc.WithKeepaliveParams(kaParams))
|
||||||
|
}
|
||||||
|
|
||||||
opts = append(opts,
|
opts = append(opts,
|
||||||
grpc.WithDefaultCallOptions(
|
grpc.WithDefaultCallOptions(
|
||||||
@@ -58,25 +109,24 @@ func New(config config.Config, address string, sessionRegistry registry.Registry
|
|||||||
),
|
),
|
||||||
)
|
)
|
||||||
|
|
||||||
conn, err := grpc.NewClient(address, opts...)
|
conn, err := grpc.NewClient(config.Address, opts...)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("failed to connect to gRPC server at %s: %w", address, err)
|
return nil, fmt.Errorf("failed to connect to gRPC server at %s: %w", config.Address, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
eventService := proto.NewEventServiceClient(conn)
|
eventService := proto.NewEventServiceClient(conn)
|
||||||
authorizeConnectionService := proto.NewUserServiceClient(conn)
|
authorizeConnectionService := proto.NewUserServiceClient(conn)
|
||||||
|
|
||||||
return &client{
|
return &Client{
|
||||||
config: config,
|
|
||||||
conn: conn,
|
conn: conn,
|
||||||
address: address,
|
config: config,
|
||||||
sessionRegistry: sessionRegistry,
|
sessionRegistry: sessionRegistry,
|
||||||
eventService: eventService,
|
eventService: eventService,
|
||||||
authorizeConnectionService: authorizeConnectionService,
|
authorizeConnectionService: authorizeConnectionService,
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *client) SubscribeEvents(ctx context.Context, identity, authToken string) error {
|
func (c *Client) SubscribeEvents(ctx context.Context, identity, authToken string) error {
|
||||||
const (
|
const (
|
||||||
baseBackoff = time.Second
|
baseBackoff = time.Second
|
||||||
maxBackoff = 30 * time.Second
|
maxBackoff = 30 * time.Second
|
||||||
@@ -159,7 +209,7 @@ func (c *client) SubscribeEvents(ctx context.Context, identity, authToken string
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *client) processEventStream(subscribe grpc.BidiStreamingClient[proto.Node, proto.Events]) error {
|
func (c *Client) processEventStream(subscribe grpc.BidiStreamingClient[proto.Node, proto.Events]) error {
|
||||||
handlers := c.eventHandlers(subscribe)
|
handlers := c.eventHandlers(subscribe)
|
||||||
|
|
||||||
for {
|
for {
|
||||||
@@ -180,7 +230,7 @@ func (c *client) processEventStream(subscribe grpc.BidiStreamingClient[proto.Nod
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *client) eventHandlers(subscribe grpc.BidiStreamingClient[proto.Node, proto.Events]) map[proto.EventType]func(*proto.Events) error {
|
func (c *Client) eventHandlers(subscribe grpc.BidiStreamingClient[proto.Node, proto.Events]) map[proto.EventType]func(*proto.Events) error {
|
||||||
return map[proto.EventType]func(*proto.Events) error{
|
return map[proto.EventType]func(*proto.Events) error{
|
||||||
proto.EventType_SLUG_CHANGE: func(evt *proto.Events) error { return c.handleSlugChange(subscribe, evt) },
|
proto.EventType_SLUG_CHANGE: func(evt *proto.Events) error { return c.handleSlugChange(subscribe, evt) },
|
||||||
proto.EventType_GET_SESSIONS: func(evt *proto.Events) error { return c.handleGetSessions(subscribe, evt) },
|
proto.EventType_GET_SESSIONS: func(evt *proto.Events) error { return c.handleGetSessions(subscribe, evt) },
|
||||||
@@ -188,13 +238,13 @@ func (c *client) eventHandlers(subscribe grpc.BidiStreamingClient[proto.Node, pr
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *client) handleSlugChange(subscribe grpc.BidiStreamingClient[proto.Node, proto.Events], evt *proto.Events) error {
|
func (c *Client) handleSlugChange(subscribe grpc.BidiStreamingClient[proto.Node, proto.Events], evt *proto.Events) error {
|
||||||
slugEvent := evt.GetSlugEvent()
|
slugEvent := evt.GetSlugEvent()
|
||||||
user := slugEvent.GetUser()
|
user := slugEvent.GetUser()
|
||||||
oldSlug := slugEvent.GetOld()
|
oldSlug := slugEvent.GetOld()
|
||||||
newSlug := slugEvent.GetNew()
|
newSlug := slugEvent.GetNew()
|
||||||
|
|
||||||
userSession, err := c.sessionRegistry.Get(types.SessionKey{Id: oldSlug, Type: types.TunnelTypeHTTP})
|
userSession, err := c.sessionRegistry.Get(types.SessionKey{Id: oldSlug, Type: types.HTTP})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return c.sendNode(subscribe, &proto.Node{
|
return c.sendNode(subscribe, &proto.Node{
|
||||||
Type: proto.EventType_SLUG_CHANGE_RESPONSE,
|
Type: proto.EventType_SLUG_CHANGE_RESPONSE,
|
||||||
@@ -204,7 +254,7 @@ func (c *client) handleSlugChange(subscribe grpc.BidiStreamingClient[proto.Node,
|
|||||||
}, "slug change failure response")
|
}, "slug change failure response")
|
||||||
}
|
}
|
||||||
|
|
||||||
if err = c.sessionRegistry.Update(user, types.SessionKey{Id: oldSlug, Type: types.TunnelTypeHTTP}, types.SessionKey{Id: newSlug, Type: types.TunnelTypeHTTP}); err != nil {
|
if err = c.sessionRegistry.Update(user, types.SessionKey{Id: oldSlug, Type: types.HTTP}, types.SessionKey{Id: newSlug, Type: types.HTTP}); err != nil {
|
||||||
return c.sendNode(subscribe, &proto.Node{
|
return c.sendNode(subscribe, &proto.Node{
|
||||||
Type: proto.EventType_SLUG_CHANGE_RESPONSE,
|
Type: proto.EventType_SLUG_CHANGE_RESPONSE,
|
||||||
Payload: &proto.Node_SlugEventResponse{
|
Payload: &proto.Node_SlugEventResponse{
|
||||||
@@ -213,7 +263,7 @@ func (c *client) handleSlugChange(subscribe grpc.BidiStreamingClient[proto.Node,
|
|||||||
}, "slug change failure response")
|
}, "slug change failure response")
|
||||||
}
|
}
|
||||||
|
|
||||||
userSession.Interaction().Redraw()
|
userSession.GetInteraction().Redraw()
|
||||||
return c.sendNode(subscribe, &proto.Node{
|
return c.sendNode(subscribe, &proto.Node{
|
||||||
Type: proto.EventType_SLUG_CHANGE_RESPONSE,
|
Type: proto.EventType_SLUG_CHANGE_RESPONSE,
|
||||||
Payload: &proto.Node_SlugEventResponse{
|
Payload: &proto.Node_SlugEventResponse{
|
||||||
@@ -222,14 +272,14 @@ func (c *client) handleSlugChange(subscribe grpc.BidiStreamingClient[proto.Node,
|
|||||||
}, "slug change success response")
|
}, "slug change success response")
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *client) handleGetSessions(subscribe grpc.BidiStreamingClient[proto.Node, proto.Events], evt *proto.Events) error {
|
func (c *Client) handleGetSessions(subscribe grpc.BidiStreamingClient[proto.Node, proto.Events], evt *proto.Events) error {
|
||||||
sessions := c.sessionRegistry.GetAllSessionFromUser(evt.GetGetSessionsEvent().GetIdentity())
|
sessions := c.sessionRegistry.GetAllSessionFromUser(evt.GetGetSessionsEvent().GetIdentity())
|
||||||
|
|
||||||
var details []*proto.Detail
|
var details []*proto.Detail
|
||||||
for _, ses := range sessions {
|
for _, ses := range sessions {
|
||||||
detail := ses.Detail()
|
detail := ses.Detail()
|
||||||
details = append(details, &proto.Detail{
|
details = append(details, &proto.Detail{
|
||||||
Node: c.config.Domain(),
|
Node: config.Getenv("DOMAIN", "localhost"),
|
||||||
ForwardingType: detail.ForwardingType,
|
ForwardingType: detail.ForwardingType,
|
||||||
Slug: detail.Slug,
|
Slug: detail.Slug,
|
||||||
UserId: detail.UserID,
|
UserId: detail.UserID,
|
||||||
@@ -246,7 +296,7 @@ func (c *client) handleGetSessions(subscribe grpc.BidiStreamingClient[proto.Node
|
|||||||
}, "send get sessions response")
|
}, "send get sessions response")
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *client) handleTerminateSession(subscribe grpc.BidiStreamingClient[proto.Node, proto.Events], evt *proto.Events) error {
|
func (c *Client) handleTerminateSession(subscribe grpc.BidiStreamingClient[proto.Node, proto.Events], evt *proto.Events) error {
|
||||||
terminate := evt.GetTerminateSessionEvent()
|
terminate := evt.GetTerminateSessionEvent()
|
||||||
user := terminate.GetUser()
|
user := terminate.GetUser()
|
||||||
slug := terminate.GetSlug()
|
slug := terminate.GetSlug()
|
||||||
@@ -271,7 +321,7 @@ func (c *client) handleTerminateSession(subscribe grpc.BidiStreamingClient[proto
|
|||||||
}, "terminate session fetch failed")
|
}, "terminate session fetch failed")
|
||||||
}
|
}
|
||||||
|
|
||||||
if err = userSession.Lifecycle().Close(); err != nil {
|
if err = userSession.GetLifecycle().Close(); err != nil {
|
||||||
return c.sendNode(subscribe, &proto.Node{
|
return c.sendNode(subscribe, &proto.Node{
|
||||||
Type: proto.EventType_TERMINATE_SESSION,
|
Type: proto.EventType_TERMINATE_SESSION,
|
||||||
Payload: &proto.Node_TerminateSessionEventResponse{
|
Payload: &proto.Node_TerminateSessionEventResponse{
|
||||||
@@ -288,7 +338,7 @@ func (c *client) handleTerminateSession(subscribe grpc.BidiStreamingClient[proto
|
|||||||
}, "terminate session success response")
|
}, "terminate session success response")
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *client) sendNode(subscribe grpc.BidiStreamingClient[proto.Node, proto.Events], node *proto.Node, context string) error {
|
func (c *Client) sendNode(subscribe grpc.BidiStreamingClient[proto.Node, proto.Events], node *proto.Node, context string) error {
|
||||||
if err := subscribe.Send(node); err != nil {
|
if err := subscribe.Send(node); err != nil {
|
||||||
if c.isConnectionError(err) {
|
if c.isConnectionError(err) {
|
||||||
return err
|
return err
|
||||||
@@ -298,22 +348,22 @@ func (c *client) sendNode(subscribe grpc.BidiStreamingClient[proto.Node, proto.E
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *client) protoToTunnelType(t proto.TunnelType) (types.TunnelType, error) {
|
func (c *Client) protoToTunnelType(t proto.TunnelType) (types.TunnelType, error) {
|
||||||
switch t {
|
switch t {
|
||||||
case proto.TunnelType_HTTP:
|
case proto.TunnelType_HTTP:
|
||||||
return types.TunnelTypeHTTP, nil
|
return types.HTTP, nil
|
||||||
case proto.TunnelType_TCP:
|
case proto.TunnelType_TCP:
|
||||||
return types.TunnelTypeTCP, nil
|
return types.TCP, nil
|
||||||
default:
|
default:
|
||||||
return types.TunnelTypeUNKNOWN, fmt.Errorf("unknown tunnel type received")
|
return types.UNKNOWN, fmt.Errorf("unknown tunnel type received")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *client) ClientConn() *grpc.ClientConn {
|
func (c *Client) GetConnection() *grpc.ClientConn {
|
||||||
return c.conn
|
return c.conn
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *client) AuthorizeConn(ctx context.Context, token string) (authorized bool, user string, err error) {
|
func (c *Client) AuthorizeConn(ctx context.Context, token string) (authorized bool, user string, err error) {
|
||||||
check, err := c.authorizeConnectionService.Check(ctx, &proto.CheckRequest{AuthToken: token})
|
check, err := c.authorizeConnectionService.Check(ctx, &proto.CheckRequest{AuthToken: token})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false, "UNAUTHORIZED", err
|
return false, "UNAUTHORIZED", err
|
||||||
@@ -325,8 +375,17 @@ func (c *client) AuthorizeConn(ctx context.Context, token string) (authorized bo
|
|||||||
return true, check.GetUser(), nil
|
return true, check.GetUser(), nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *client) CheckServerHealth(ctx context.Context) error {
|
func (c *Client) Close() error {
|
||||||
healthClient := grpc_health_v1.NewHealthClient(c.ClientConn())
|
if c.conn != nil {
|
||||||
|
log.Printf("Closing gRPC connection to %s", c.config.Address)
|
||||||
|
c.closing = true
|
||||||
|
return c.conn.Close()
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *Client) CheckServerHealth(ctx context.Context) error {
|
||||||
|
healthClient := grpc_health_v1.NewHealthClient(c.GetConnection())
|
||||||
resp, err := healthClient.Check(ctx, &grpc_health_v1.HealthCheckRequest{
|
resp, err := healthClient.Check(ctx, &grpc_health_v1.HealthCheckRequest{
|
||||||
Service: "",
|
Service: "",
|
||||||
})
|
})
|
||||||
@@ -339,16 +398,11 @@ func (c *client) CheckServerHealth(ctx context.Context) error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *client) Close() error {
|
func (c *Client) GetConfig() *GrpcConfig {
|
||||||
if c.conn != nil {
|
return c.config
|
||||||
log.Printf("Closing gRPC connection to %s", c.address)
|
|
||||||
c.closing = true
|
|
||||||
return c.conn.Close()
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *client) isConnectionError(err error) bool {
|
func (c *Client) isConnectionError(err error) bool {
|
||||||
if c.closing {
|
if c.closing {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,30 +0,0 @@
|
|||||||
package header
|
|
||||||
|
|
||||||
type ResponseHeader interface {
|
|
||||||
Value(key string) string
|
|
||||||
Set(key string, value string)
|
|
||||||
Remove(key string)
|
|
||||||
Finalize() []byte
|
|
||||||
}
|
|
||||||
|
|
||||||
type responseHeader struct {
|
|
||||||
startLine []byte
|
|
||||||
headers map[string]string
|
|
||||||
}
|
|
||||||
|
|
||||||
type RequestHeader interface {
|
|
||||||
Value(key string) string
|
|
||||||
Set(key string, value string)
|
|
||||||
Remove(key string)
|
|
||||||
Finalize() []byte
|
|
||||||
Method() string
|
|
||||||
Path() string
|
|
||||||
Version() string
|
|
||||||
}
|
|
||||||
type requestHeader struct {
|
|
||||||
method string
|
|
||||||
path string
|
|
||||||
version string
|
|
||||||
startLine []byte
|
|
||||||
headers map[string]string
|
|
||||||
}
|
|
||||||
@@ -1,148 +0,0 @@
|
|||||||
package header
|
|
||||||
|
|
||||||
import (
|
|
||||||
"bufio"
|
|
||||||
"bytes"
|
|
||||||
"fmt"
|
|
||||||
)
|
|
||||||
|
|
||||||
func setRemainingHeaders(remaining []byte, header interface {
|
|
||||||
Set(key string, value string)
|
|
||||||
}) {
|
|
||||||
for len(remaining) > 0 {
|
|
||||||
lineEnd := bytes.Index(remaining, []byte("\r\n"))
|
|
||||||
if lineEnd == -1 {
|
|
||||||
lineEnd = len(remaining)
|
|
||||||
}
|
|
||||||
|
|
||||||
line := remaining[:lineEnd]
|
|
||||||
|
|
||||||
if len(line) == 0 {
|
|
||||||
break
|
|
||||||
}
|
|
||||||
|
|
||||||
colonIdx := bytes.IndexByte(line, ':')
|
|
||||||
if colonIdx != -1 {
|
|
||||||
key := bytes.TrimSpace(line[:colonIdx])
|
|
||||||
value := bytes.TrimSpace(line[colonIdx+1:])
|
|
||||||
header.Set(string(key), string(value))
|
|
||||||
}
|
|
||||||
|
|
||||||
if lineEnd == len(remaining) {
|
|
||||||
break
|
|
||||||
}
|
|
||||||
|
|
||||||
remaining = remaining[lineEnd+2:]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func parseHeadersFromBytes(headerData []byte) (RequestHeader, error) {
|
|
||||||
header := &requestHeader{
|
|
||||||
headers: make(map[string]string, 16),
|
|
||||||
}
|
|
||||||
|
|
||||||
lineEnd := bytes.Index(headerData, []byte("\r\n"))
|
|
||||||
if lineEnd == -1 {
|
|
||||||
return nil, fmt.Errorf("invalid request: no CRLF found in start line")
|
|
||||||
}
|
|
||||||
|
|
||||||
startLine := headerData[:lineEnd]
|
|
||||||
header.startLine = startLine
|
|
||||||
var err error
|
|
||||||
header.method, header.path, header.version, err = parseStartLine(startLine)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
remaining := headerData[lineEnd+2:]
|
|
||||||
|
|
||||||
setRemainingHeaders(remaining, header)
|
|
||||||
|
|
||||||
return header, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func parseStartLine(startLine []byte) (method, path, version string, err error) {
|
|
||||||
firstSpace := bytes.IndexByte(startLine, ' ')
|
|
||||||
if firstSpace == -1 {
|
|
||||||
return "", "", "", fmt.Errorf("invalid start line: missing method")
|
|
||||||
}
|
|
||||||
|
|
||||||
secondSpace := bytes.IndexByte(startLine[firstSpace+1:], ' ')
|
|
||||||
if secondSpace == -1 {
|
|
||||||
return "", "", "", fmt.Errorf("invalid start line: missing version")
|
|
||||||
}
|
|
||||||
secondSpace += firstSpace + 1
|
|
||||||
|
|
||||||
method = string(startLine[:firstSpace])
|
|
||||||
path = string(startLine[firstSpace+1 : secondSpace])
|
|
||||||
version = string(startLine[secondSpace+1:])
|
|
||||||
|
|
||||||
return method, path, version, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func parseHeadersFromReader(br *bufio.Reader) (RequestHeader, error) {
|
|
||||||
header := &requestHeader{
|
|
||||||
headers: make(map[string]string, 16),
|
|
||||||
}
|
|
||||||
|
|
||||||
startLineBytes, err := br.ReadSlice('\n')
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
startLineBytes = bytes.TrimRight(startLineBytes, "\r\n")
|
|
||||||
header.startLine = make([]byte, len(startLineBytes))
|
|
||||||
copy(header.startLine, startLineBytes)
|
|
||||||
|
|
||||||
header.method, header.path, header.version, err = parseStartLine(header.startLine)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
for {
|
|
||||||
lineBytes, err := br.ReadSlice('\n')
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
lineBytes = bytes.TrimRight(lineBytes, "\r\n")
|
|
||||||
|
|
||||||
if len(lineBytes) == 0 {
|
|
||||||
break
|
|
||||||
}
|
|
||||||
|
|
||||||
colonIdx := bytes.IndexByte(lineBytes, ':')
|
|
||||||
if colonIdx == -1 {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
key := bytes.TrimSpace(lineBytes[:colonIdx])
|
|
||||||
value := bytes.TrimSpace(lineBytes[colonIdx+1:])
|
|
||||||
|
|
||||||
header.headers[string(key)] = string(value)
|
|
||||||
}
|
|
||||||
|
|
||||||
return header, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func finalize(startLine []byte, headers map[string]string) []byte {
|
|
||||||
size := len(startLine) + 2
|
|
||||||
for key, val := range headers {
|
|
||||||
size += len(key) + 2 + len(val) + 2
|
|
||||||
}
|
|
||||||
size += 2
|
|
||||||
|
|
||||||
buf := make([]byte, 0, size)
|
|
||||||
buf = append(buf, startLine...)
|
|
||||||
buf = append(buf, '\r', '\n')
|
|
||||||
|
|
||||||
for key, val := range headers {
|
|
||||||
buf = append(buf, key...)
|
|
||||||
buf = append(buf, ':', ' ')
|
|
||||||
buf = append(buf, val...)
|
|
||||||
buf = append(buf, '\r', '\n')
|
|
||||||
}
|
|
||||||
|
|
||||||
buf = append(buf, '\r', '\n')
|
|
||||||
return buf
|
|
||||||
}
|
|
||||||
@@ -1,49 +0,0 @@
|
|||||||
package header
|
|
||||||
|
|
||||||
import (
|
|
||||||
"bufio"
|
|
||||||
"fmt"
|
|
||||||
)
|
|
||||||
|
|
||||||
func NewRequest(r interface{}) (RequestHeader, error) {
|
|
||||||
switch v := r.(type) {
|
|
||||||
case []byte:
|
|
||||||
return parseHeadersFromBytes(v)
|
|
||||||
case *bufio.Reader:
|
|
||||||
return parseHeadersFromReader(v)
|
|
||||||
default:
|
|
||||||
return nil, fmt.Errorf("unsupported type: %T", r)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (req *requestHeader) Value(key string) string {
|
|
||||||
val, ok := req.headers[key]
|
|
||||||
if !ok {
|
|
||||||
return ""
|
|
||||||
}
|
|
||||||
return val
|
|
||||||
}
|
|
||||||
|
|
||||||
func (req *requestHeader) Set(key string, value string) {
|
|
||||||
req.headers[key] = value
|
|
||||||
}
|
|
||||||
|
|
||||||
func (req *requestHeader) Remove(key string) {
|
|
||||||
delete(req.headers, key)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (req *requestHeader) Method() string {
|
|
||||||
return req.method
|
|
||||||
}
|
|
||||||
|
|
||||||
func (req *requestHeader) Path() string {
|
|
||||||
return req.path
|
|
||||||
}
|
|
||||||
|
|
||||||
func (req *requestHeader) Version() string {
|
|
||||||
return req.version
|
|
||||||
}
|
|
||||||
|
|
||||||
func (req *requestHeader) Finalize() []byte {
|
|
||||||
return finalize(req.startLine, req.headers)
|
|
||||||
}
|
|
||||||
@@ -1,40 +0,0 @@
|
|||||||
package header
|
|
||||||
|
|
||||||
import (
|
|
||||||
"bytes"
|
|
||||||
"fmt"
|
|
||||||
)
|
|
||||||
|
|
||||||
func NewResponse(headerData []byte) (ResponseHeader, error) {
|
|
||||||
header := &responseHeader{
|
|
||||||
startLine: nil,
|
|
||||||
headers: make(map[string]string, 16),
|
|
||||||
}
|
|
||||||
|
|
||||||
lineEnd := bytes.Index(headerData, []byte("\r\n"))
|
|
||||||
if lineEnd == -1 {
|
|
||||||
return nil, fmt.Errorf("invalid response: no CRLF found in start line")
|
|
||||||
}
|
|
||||||
|
|
||||||
header.startLine = headerData[:lineEnd]
|
|
||||||
remaining := headerData[lineEnd+2:]
|
|
||||||
setRemainingHeaders(remaining, header)
|
|
||||||
|
|
||||||
return header, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (resp *responseHeader) Value(key string) string {
|
|
||||||
return resp.headers[key]
|
|
||||||
}
|
|
||||||
|
|
||||||
func (resp *responseHeader) Set(key string, value string) {
|
|
||||||
resp.headers[key] = value
|
|
||||||
}
|
|
||||||
|
|
||||||
func (resp *responseHeader) Remove(key string) {
|
|
||||||
delete(resp.headers, key)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (resp *responseHeader) Finalize() []byte {
|
|
||||||
return finalize(resp.startLine, resp.headers)
|
|
||||||
}
|
|
||||||
@@ -1,29 +0,0 @@
|
|||||||
package stream
|
|
||||||
|
|
||||||
import "bytes"
|
|
||||||
|
|
||||||
func splitHeaderAndBody(data []byte, delimiterIdx int) ([]byte, []byte) {
|
|
||||||
headerByte := data[:delimiterIdx+len(DELIMITER)]
|
|
||||||
body := data[delimiterIdx+len(DELIMITER):]
|
|
||||||
return headerByte, body
|
|
||||||
}
|
|
||||||
|
|
||||||
func isHTTPHeader(buf []byte) bool {
|
|
||||||
lines := bytes.Split(buf, []byte("\r\n"))
|
|
||||||
|
|
||||||
startLine := string(lines[0])
|
|
||||||
if !requestLine.MatchString(startLine) && !responseLine.MatchString(startLine) {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, line := range lines[1:] {
|
|
||||||
if len(line) == 0 {
|
|
||||||
break
|
|
||||||
}
|
|
||||||
colonIdx := bytes.IndexByte(line, ':')
|
|
||||||
if colonIdx <= 0 {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
@@ -1,50 +0,0 @@
|
|||||||
package stream
|
|
||||||
|
|
||||||
import (
|
|
||||||
"bytes"
|
|
||||||
"tunnel_pls/internal/http/header"
|
|
||||||
)
|
|
||||||
|
|
||||||
func (hs *http) Read(p []byte) (int, error) {
|
|
||||||
tmp := make([]byte, len(p))
|
|
||||||
read, err := hs.reader.Read(tmp)
|
|
||||||
if read == 0 && err != nil {
|
|
||||||
return 0, err
|
|
||||||
}
|
|
||||||
|
|
||||||
tmp = tmp[:read]
|
|
||||||
|
|
||||||
headerEndIdx := bytes.Index(tmp, DELIMITER)
|
|
||||||
if headerEndIdx == -1 {
|
|
||||||
return handleNoDelimiter(p, tmp, err)
|
|
||||||
}
|
|
||||||
|
|
||||||
headerByte, bodyByte := splitHeaderAndBody(tmp, headerEndIdx)
|
|
||||||
|
|
||||||
if !isHTTPHeader(headerByte) {
|
|
||||||
copy(p, tmp)
|
|
||||||
return read, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
return hs.processHTTPRequest(p, headerByte, bodyByte)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hs *http) processHTTPRequest(p, headerByte, bodyByte []byte) (int, error) {
|
|
||||||
reqhf, err := header.NewRequest(headerByte)
|
|
||||||
if err != nil {
|
|
||||||
return 0, err
|
|
||||||
}
|
|
||||||
|
|
||||||
if err = hs.ApplyRequestMiddlewares(reqhf); err != nil {
|
|
||||||
return 0, err
|
|
||||||
}
|
|
||||||
|
|
||||||
hs.reqHeader = reqhf
|
|
||||||
combined := append(reqhf.Finalize(), bodyByte...)
|
|
||||||
return copy(p, combined), nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func handleNoDelimiter(p, tmp []byte, err error) (int, error) {
|
|
||||||
copy(p, tmp)
|
|
||||||
return len(tmp), err
|
|
||||||
}
|
|
||||||
@@ -1,103 +0,0 @@
|
|||||||
package stream
|
|
||||||
|
|
||||||
import (
|
|
||||||
"io"
|
|
||||||
"log"
|
|
||||||
"net"
|
|
||||||
"regexp"
|
|
||||||
"tunnel_pls/internal/http/header"
|
|
||||||
"tunnel_pls/internal/middleware"
|
|
||||||
)
|
|
||||||
|
|
||||||
var DELIMITER = []byte{0x0D, 0x0A, 0x0D, 0x0A}
|
|
||||||
var requestLine = regexp.MustCompile(`^(GET|POST|PUT|DELETE|HEAD|OPTIONS|PATCH|TRACE|CONNECT) \S+ HTTP/\d\.\d$`)
|
|
||||||
var responseLine = regexp.MustCompile(`^HTTP/\d\.\d \d{3} .+`)
|
|
||||||
|
|
||||||
type HTTP interface {
|
|
||||||
io.ReadWriteCloser
|
|
||||||
CloseWrite() error
|
|
||||||
RemoteAddr() net.Addr
|
|
||||||
UseResponseMiddleware(mw middleware.ResponseMiddleware)
|
|
||||||
UseRequestMiddleware(mw middleware.RequestMiddleware)
|
|
||||||
SetRequestHeader(header header.RequestHeader)
|
|
||||||
RequestMiddlewares() []middleware.RequestMiddleware
|
|
||||||
ResponseMiddlewares() []middleware.ResponseMiddleware
|
|
||||||
ApplyResponseMiddlewares(resphf header.ResponseHeader, body []byte) error
|
|
||||||
ApplyRequestMiddlewares(reqhf header.RequestHeader) error
|
|
||||||
}
|
|
||||||
|
|
||||||
type http struct {
|
|
||||||
remoteAddr net.Addr
|
|
||||||
writer io.Writer
|
|
||||||
reader io.Reader
|
|
||||||
headerBuf []byte
|
|
||||||
buf []byte
|
|
||||||
respHeader header.ResponseHeader
|
|
||||||
reqHeader header.RequestHeader
|
|
||||||
respMW []middleware.ResponseMiddleware
|
|
||||||
reqMW []middleware.RequestMiddleware
|
|
||||||
}
|
|
||||||
|
|
||||||
func New(writer io.Writer, reader io.Reader, remoteAddr net.Addr) HTTP {
|
|
||||||
return &http{
|
|
||||||
remoteAddr: remoteAddr,
|
|
||||||
writer: writer,
|
|
||||||
reader: reader,
|
|
||||||
buf: make([]byte, 0, 4096),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hs *http) RemoteAddr() net.Addr {
|
|
||||||
return hs.remoteAddr
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hs *http) UseResponseMiddleware(mw middleware.ResponseMiddleware) {
|
|
||||||
hs.respMW = append(hs.respMW, mw)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hs *http) UseRequestMiddleware(mw middleware.RequestMiddleware) {
|
|
||||||
hs.reqMW = append(hs.reqMW, mw)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hs *http) SetRequestHeader(header header.RequestHeader) {
|
|
||||||
hs.reqHeader = header
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hs *http) RequestMiddlewares() []middleware.RequestMiddleware {
|
|
||||||
return hs.reqMW
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hs *http) ResponseMiddlewares() []middleware.ResponseMiddleware {
|
|
||||||
return hs.respMW
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hs *http) Close() error {
|
|
||||||
return hs.writer.(io.Closer).Close()
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hs *http) CloseWrite() error {
|
|
||||||
if closer, ok := hs.writer.(interface{ CloseWrite() error }); ok {
|
|
||||||
return closer.CloseWrite()
|
|
||||||
}
|
|
||||||
return hs.Close()
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hs *http) ApplyRequestMiddlewares(reqhf header.RequestHeader) error {
|
|
||||||
for _, m := range hs.RequestMiddlewares() {
|
|
||||||
if err := m.HandleRequest(reqhf); err != nil {
|
|
||||||
log.Printf("Error when applying request middleware: %v", err)
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hs *http) ApplyResponseMiddlewares(resphf header.ResponseHeader, bodyByte []byte) error {
|
|
||||||
for _, m := range hs.ResponseMiddlewares() {
|
|
||||||
if err := m.HandleResponse(resphf, bodyByte); err != nil {
|
|
||||||
log.Printf("Cannot apply middleware: %s\n", err)
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
@@ -1,88 +0,0 @@
|
|||||||
package stream
|
|
||||||
|
|
||||||
import (
|
|
||||||
"bytes"
|
|
||||||
"tunnel_pls/internal/http/header"
|
|
||||||
)
|
|
||||||
|
|
||||||
func (hs *http) Write(p []byte) (int, error) {
|
|
||||||
if hs.shouldBypassBuffering(p) {
|
|
||||||
hs.respHeader = nil
|
|
||||||
}
|
|
||||||
|
|
||||||
if hs.respHeader != nil {
|
|
||||||
return hs.writer.Write(p)
|
|
||||||
}
|
|
||||||
|
|
||||||
hs.buf = append(hs.buf, p...)
|
|
||||||
|
|
||||||
headerEndIdx := bytes.Index(hs.buf, DELIMITER)
|
|
||||||
if headerEndIdx == -1 {
|
|
||||||
return len(p), nil
|
|
||||||
}
|
|
||||||
|
|
||||||
return hs.processBufferedResponse(p, headerEndIdx)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hs *http) shouldBypassBuffering(p []byte) bool {
|
|
||||||
return hs.respHeader != nil && len(hs.buf) == 0 && len(p) >= 5 && string(p[0:5]) == "HTTP/"
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hs *http) processBufferedResponse(p []byte, delimiterIdx int) (int, error) {
|
|
||||||
headerByte, bodyByte := splitHeaderAndBody(hs.buf, delimiterIdx)
|
|
||||||
|
|
||||||
if !isHTTPHeader(headerByte) {
|
|
||||||
return hs.writeRawBuffer()
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := hs.processHTTPResponse(headerByte, bodyByte); err != nil {
|
|
||||||
return 0, err
|
|
||||||
}
|
|
||||||
|
|
||||||
hs.buf = nil
|
|
||||||
return len(p), nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hs *http) writeRawBuffer() (int, error) {
|
|
||||||
_, err := hs.writer.Write(hs.buf)
|
|
||||||
length := len(hs.buf)
|
|
||||||
hs.buf = nil
|
|
||||||
if err != nil {
|
|
||||||
return 0, err
|
|
||||||
}
|
|
||||||
return length, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hs *http) processHTTPResponse(headerByte, bodyByte []byte) error {
|
|
||||||
resphf, err := header.NewResponse(headerByte)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
if err = hs.ApplyResponseMiddlewares(resphf, bodyByte); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
hs.respHeader = resphf
|
|
||||||
finalHeader := resphf.Finalize()
|
|
||||||
|
|
||||||
if err = hs.writeHeaderAndBody(finalHeader, bodyByte); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hs *http) writeHeaderAndBody(header, bodyByte []byte) error {
|
|
||||||
if _, err := hs.writer.Write(header); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
if len(bodyByte) > 0 {
|
|
||||||
if _, err := hs.writer.Write(bodyByte); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
@@ -1,23 +0,0 @@
|
|||||||
package middleware
|
|
||||||
|
|
||||||
import (
|
|
||||||
"net"
|
|
||||||
"tunnel_pls/internal/http/header"
|
|
||||||
)
|
|
||||||
|
|
||||||
type ForwardedFor struct {
|
|
||||||
addr net.Addr
|
|
||||||
}
|
|
||||||
|
|
||||||
func NewForwardedFor(addr net.Addr) *ForwardedFor {
|
|
||||||
return &ForwardedFor{addr: addr}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (ff *ForwardedFor) HandleRequest(header header.RequestHeader) error {
|
|
||||||
host, _, err := net.SplitHostPort(ff.addr.String())
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
header.Set("X-Forwarded-For", host)
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
@@ -1,13 +0,0 @@
|
|||||||
package middleware
|
|
||||||
|
|
||||||
import (
|
|
||||||
"tunnel_pls/internal/http/header"
|
|
||||||
)
|
|
||||||
|
|
||||||
type RequestMiddleware interface {
|
|
||||||
HandleRequest(header header.RequestHeader) error
|
|
||||||
}
|
|
||||||
|
|
||||||
type ResponseMiddleware interface {
|
|
||||||
HandleResponse(header header.ResponseHeader, body []byte) error
|
|
||||||
}
|
|
||||||
@@ -1,16 +0,0 @@
|
|||||||
package middleware
|
|
||||||
|
|
||||||
import (
|
|
||||||
"tunnel_pls/internal/http/header"
|
|
||||||
)
|
|
||||||
|
|
||||||
type TunnelFingerprint struct{}
|
|
||||||
|
|
||||||
func NewTunnelFingerprint() *TunnelFingerprint {
|
|
||||||
return &TunnelFingerprint{}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *TunnelFingerprint) HandleResponse(header header.ResponseHeader, body []byte) error {
|
|
||||||
header.Set("Server", "Tunnel Please")
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
+47
-34
@@ -3,40 +3,63 @@ package port
|
|||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"sort"
|
"sort"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
"sync"
|
"sync"
|
||||||
|
"tunnel_pls/internal/config"
|
||||||
)
|
)
|
||||||
|
|
||||||
type Port interface {
|
type Manager interface {
|
||||||
AddRange(startPort, endPort uint16) error
|
AddPortRange(startPort, endPort uint16) error
|
||||||
Unassigned() (uint16, bool)
|
GetUnassignedPort() (uint16, bool)
|
||||||
SetStatus(port uint16, assigned bool) error
|
SetPortStatus(port uint16, assigned bool) error
|
||||||
Claim(port uint16) (claimed bool)
|
GetPortStatus(port uint16) (bool, bool)
|
||||||
}
|
}
|
||||||
|
|
||||||
type port struct {
|
type manager struct {
|
||||||
mu sync.RWMutex
|
mu sync.RWMutex
|
||||||
ports map[uint16]bool
|
ports map[uint16]bool
|
||||||
sortedPorts []uint16
|
sortedPorts []uint16
|
||||||
}
|
}
|
||||||
|
|
||||||
func New() Port {
|
var Default Manager = &manager{
|
||||||
return &port{
|
|
||||||
ports: make(map[uint16]bool),
|
ports: make(map[uint16]bool),
|
||||||
sortedPorts: []uint16{},
|
sortedPorts: []uint16{},
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (pm *port) AddRange(startPort, endPort uint16) error {
|
func init() {
|
||||||
|
rawRange := config.Getenv("ALLOWED_PORTS", "")
|
||||||
|
if rawRange == "" {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
splitRange := strings.Split(rawRange, "-")
|
||||||
|
if len(splitRange) != 2 {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
start, err := strconv.ParseUint(splitRange[0], 10, 16)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
end, err := strconv.ParseUint(splitRange[1], 10, 16)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
_ = Default.AddPortRange(uint16(start), uint16(end))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (pm *manager) AddPortRange(startPort, endPort uint16) error {
|
||||||
pm.mu.Lock()
|
pm.mu.Lock()
|
||||||
defer pm.mu.Unlock()
|
defer pm.mu.Unlock()
|
||||||
|
|
||||||
if startPort > endPort {
|
if startPort > endPort {
|
||||||
return fmt.Errorf("start port cannot be greater than end port")
|
return fmt.Errorf("start port cannot be greater than end port")
|
||||||
}
|
}
|
||||||
for index := startPort; index <= endPort; index++ {
|
for port := startPort; port <= endPort; port++ {
|
||||||
if _, exists := pm.ports[index]; !exists {
|
if _, exists := pm.ports[port]; !exists {
|
||||||
pm.ports[index] = false
|
pm.ports[port] = false
|
||||||
pm.sortedPorts = append(pm.sortedPorts, index)
|
pm.sortedPorts = append(pm.sortedPorts, port)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
sort.Slice(pm.sortedPorts, func(i, j int) bool {
|
sort.Slice(pm.sortedPorts, func(i, j int) bool {
|
||||||
@@ -45,19 +68,20 @@ func (pm *port) AddRange(startPort, endPort uint16) error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (pm *port) Unassigned() (uint16, bool) {
|
func (pm *manager) GetUnassignedPort() (uint16, bool) {
|
||||||
pm.mu.Lock()
|
pm.mu.Lock()
|
||||||
defer pm.mu.Unlock()
|
defer pm.mu.Unlock()
|
||||||
|
|
||||||
for _, index := range pm.sortedPorts {
|
for _, port := range pm.sortedPorts {
|
||||||
if !pm.ports[index] {
|
if !pm.ports[port] {
|
||||||
return index, true
|
pm.ports[port] = true
|
||||||
|
return port, true
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return 0, false
|
return 0, false
|
||||||
}
|
}
|
||||||
|
|
||||||
func (pm *port) SetStatus(port uint16, assigned bool) error {
|
func (pm *manager) SetPortStatus(port uint16, assigned bool) error {
|
||||||
pm.mu.Lock()
|
pm.mu.Lock()
|
||||||
defer pm.mu.Unlock()
|
defer pm.mu.Unlock()
|
||||||
|
|
||||||
@@ -65,21 +89,10 @@ func (pm *port) SetStatus(port uint16, assigned bool) error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (pm *port) Claim(port uint16) (claimed bool) {
|
func (pm *manager) GetPortStatus(port uint16) (bool, bool) {
|
||||||
pm.mu.Lock()
|
pm.mu.RLock()
|
||||||
defer pm.mu.Unlock()
|
defer pm.mu.RUnlock()
|
||||||
|
|
||||||
status, exists := pm.ports[port]
|
status, exists := pm.ports[port]
|
||||||
|
return status, exists
|
||||||
if exists && status {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
|
||||||
if !exists {
|
|
||||||
pm.ports[port] = true
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
|
|
||||||
pm.ports[port] = true
|
|
||||||
return true
|
|
||||||
}
|
}
|
||||||
|
|||||||
+13
-13
@@ -1,18 +1,18 @@
|
|||||||
package random
|
package random
|
||||||
|
|
||||||
import "crypto/rand"
|
import (
|
||||||
|
mathrand "math/rand"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
func GenerateRandomString(length int) (string, error) {
|
func GenerateRandomString(length int) string {
|
||||||
const charset = "abcdefghijklmnopqrstuvwxyz0123456789"
|
const charset = "abcdefghijklmnopqrstuvwxyz"
|
||||||
b := make([]byte, length)
|
seededRand := mathrand.New(mathrand.NewSource(time.Now().UnixNano() + int64(mathrand.Intn(9999))))
|
||||||
|
var result strings.Builder
|
||||||
if _, err := rand.Read(b); err != nil {
|
for i := 0; i < length; i++ {
|
||||||
return "", err
|
randomIndex := seededRand.Intn(len(charset))
|
||||||
|
result.WriteString(string(charset[randomIndex]))
|
||||||
}
|
}
|
||||||
|
return result.String()
|
||||||
for i := range b {
|
|
||||||
b[i] = charset[int(b[i])%len(charset)]
|
|
||||||
}
|
|
||||||
|
|
||||||
return string(b), nil
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,40 +0,0 @@
|
|||||||
package transport
|
|
||||||
|
|
||||||
import (
|
|
||||||
"errors"
|
|
||||||
"log"
|
|
||||||
"net"
|
|
||||||
"tunnel_pls/internal/registry"
|
|
||||||
)
|
|
||||||
|
|
||||||
type httpServer struct {
|
|
||||||
handler *httpHandler
|
|
||||||
port string
|
|
||||||
}
|
|
||||||
|
|
||||||
func NewHTTPServer(domain, port string, sessionRegistry registry.Registry, redirectTLS bool) Transport {
|
|
||||||
return &httpServer{
|
|
||||||
handler: newHTTPHandler(domain, sessionRegistry, redirectTLS),
|
|
||||||
port: port,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (ht *httpServer) Listen() (net.Listener, error) {
|
|
||||||
return net.Listen("tcp", ":"+ht.port)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (ht *httpServer) Serve(listener net.Listener) error {
|
|
||||||
log.Printf("HTTP server is starting on port %s", ht.port)
|
|
||||||
for {
|
|
||||||
conn, err := listener.Accept()
|
|
||||||
if err != nil {
|
|
||||||
if errors.Is(err, net.ErrClosed) {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
log.Printf("Error accepting connection: %v", err)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
go ht.handler.handler(conn, false)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -1,231 +0,0 @@
|
|||||||
package transport
|
|
||||||
|
|
||||||
import (
|
|
||||||
"bufio"
|
|
||||||
"errors"
|
|
||||||
"fmt"
|
|
||||||
"io"
|
|
||||||
"log"
|
|
||||||
"net"
|
|
||||||
"net/http"
|
|
||||||
"strings"
|
|
||||||
"time"
|
|
||||||
"tunnel_pls/internal/http/header"
|
|
||||||
"tunnel_pls/internal/http/stream"
|
|
||||||
"tunnel_pls/internal/middleware"
|
|
||||||
"tunnel_pls/internal/registry"
|
|
||||||
"tunnel_pls/types"
|
|
||||||
|
|
||||||
"golang.org/x/crypto/ssh"
|
|
||||||
)
|
|
||||||
|
|
||||||
type httpHandler struct {
|
|
||||||
domain string
|
|
||||||
sessionRegistry registry.Registry
|
|
||||||
redirectTLS bool
|
|
||||||
}
|
|
||||||
|
|
||||||
func newHTTPHandler(domain string, sessionRegistry registry.Registry, redirectTLS bool) *httpHandler {
|
|
||||||
return &httpHandler{
|
|
||||||
domain: domain,
|
|
||||||
sessionRegistry: sessionRegistry,
|
|
||||||
redirectTLS: redirectTLS,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hh *httpHandler) redirect(conn net.Conn, status int, location string) error {
|
|
||||||
_, err := conn.Write([]byte(fmt.Sprintf("HTTP/1.1 %d Moved Permanently\r\n", status) +
|
|
||||||
fmt.Sprintf("Location: %s", location) +
|
|
||||||
"Content-Length: 0\r\n" +
|
|
||||||
"Connection: close\r\n" +
|
|
||||||
"\r\n"))
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hh *httpHandler) badRequest(conn net.Conn) error {
|
|
||||||
if _, err := conn.Write([]byte("HTTP/1.1 400 Bad Request\r\n\r\n")); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hh *httpHandler) handler(conn net.Conn, isTLS bool) {
|
|
||||||
defer hh.closeConnection(conn)
|
|
||||||
|
|
||||||
dstReader := bufio.NewReader(conn)
|
|
||||||
reqhf, err := header.NewRequest(dstReader)
|
|
||||||
if err != nil {
|
|
||||||
log.Printf("Error creating request header: %v", err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
slug, err := hh.extractSlug(reqhf)
|
|
||||||
if err != nil {
|
|
||||||
_ = hh.badRequest(conn)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
if hh.shouldRedirectToTLS(isTLS) {
|
|
||||||
_ = hh.redirect(conn, http.StatusMovedPermanently, fmt.Sprintf("Location: https://%s.%s/\r\n", slug, hh.domain))
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
if hh.handlePingRequest(slug, conn) {
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
sshSession, err := hh.getSession(slug)
|
|
||||||
if err != nil {
|
|
||||||
_ = hh.redirect(conn, http.StatusMovedPermanently, fmt.Sprintf("https://tunnl.live/tunnel-not-found?slug=%s\r\n", slug))
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
hw := stream.New(conn, dstReader, conn.RemoteAddr())
|
|
||||||
defer func(hw stream.HTTP) {
|
|
||||||
err = hw.Close()
|
|
||||||
if err != nil {
|
|
||||||
log.Printf("Error closing HTTP stream: %v", err)
|
|
||||||
}
|
|
||||||
}(hw)
|
|
||||||
hh.forwardRequest(hw, reqhf, sshSession)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hh *httpHandler) closeConnection(conn net.Conn) {
|
|
||||||
err := conn.Close()
|
|
||||||
if err != nil && !errors.Is(err, net.ErrClosed) {
|
|
||||||
log.Printf("Error closing connection: %v", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hh *httpHandler) extractSlug(reqhf header.RequestHeader) (string, error) {
|
|
||||||
host := strings.Split(reqhf.Value("Host"), ".")
|
|
||||||
if len(host) < 1 {
|
|
||||||
return "", errors.New("invalid host")
|
|
||||||
}
|
|
||||||
return host[0], nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hh *httpHandler) shouldRedirectToTLS(isTLS bool) bool {
|
|
||||||
return !isTLS && hh.redirectTLS
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hh *httpHandler) handlePingRequest(slug string, conn net.Conn) bool {
|
|
||||||
if slug != "ping" {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
|
||||||
_, err := conn.Write([]byte(
|
|
||||||
"HTTP/1.1 200 OK\r\n" +
|
|
||||||
"Content-Length: 0\r\n" +
|
|
||||||
"Connection: close\r\n" +
|
|
||||||
"Access-Control-Allow-Origin: *\r\n" +
|
|
||||||
"Access-Control-Allow-Methods: GET, HEAD, OPTIONS\r\n" +
|
|
||||||
"Access-Control-Allow-Headers: *\r\n" +
|
|
||||||
"\r\n",
|
|
||||||
))
|
|
||||||
if err != nil {
|
|
||||||
log.Println("Failed to write 200 OK:", err)
|
|
||||||
}
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hh *httpHandler) getSession(slug string) (registry.Session, error) {
|
|
||||||
sshSession, err := hh.sessionRegistry.Get(types.SessionKey{
|
|
||||||
Id: slug,
|
|
||||||
Type: types.TunnelTypeHTTP,
|
|
||||||
})
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
return sshSession, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hh *httpHandler) forwardRequest(hw stream.HTTP, initialRequest header.RequestHeader, sshSession registry.Session) {
|
|
||||||
channel, err := hh.openForwardedChannel(hw, sshSession)
|
|
||||||
if err != nil {
|
|
||||||
log.Printf("Failed to establish channel: %v", err)
|
|
||||||
sshSession.Forwarder().WriteBadGatewayResponse(hw)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
defer func() {
|
|
||||||
err = channel.Close()
|
|
||||||
if err != nil && !errors.Is(err, io.EOF) {
|
|
||||||
log.Printf("Error closing forwarded channel: %v", err)
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
|
|
||||||
hh.setupMiddlewares(hw)
|
|
||||||
|
|
||||||
if err = hh.sendInitialRequest(hw, initialRequest, channel); err != nil {
|
|
||||||
log.Printf("Failed to forward initial request: %v", err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
sshSession.Forwarder().HandleConnection(hw, channel)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hh *httpHandler) openForwardedChannel(hw stream.HTTP, sshSession registry.Session) (ssh.Channel, error) {
|
|
||||||
payload := sshSession.Forwarder().CreateForwardedTCPIPPayload(hw.RemoteAddr())
|
|
||||||
|
|
||||||
type channelResult struct {
|
|
||||||
channel ssh.Channel
|
|
||||||
reqs <-chan *ssh.Request
|
|
||||||
err error
|
|
||||||
}
|
|
||||||
|
|
||||||
resultChan := make(chan channelResult, 1)
|
|
||||||
|
|
||||||
go func() {
|
|
||||||
channel, reqs, err := sshSession.Lifecycle().Connection().OpenChannel("forwarded-tcpip", payload)
|
|
||||||
select {
|
|
||||||
case resultChan <- channelResult{channel, reqs, err}:
|
|
||||||
default:
|
|
||||||
hh.cleanupUnusedChannel(channel, reqs)
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
|
|
||||||
select {
|
|
||||||
case result := <-resultChan:
|
|
||||||
if result.err != nil {
|
|
||||||
return nil, result.err
|
|
||||||
}
|
|
||||||
go ssh.DiscardRequests(result.reqs)
|
|
||||||
return result.channel, nil
|
|
||||||
case <-time.After(5 * time.Second):
|
|
||||||
return nil, errors.New("timeout opening forwarded-tcpip channel")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hh *httpHandler) cleanupUnusedChannel(channel ssh.Channel, reqs <-chan *ssh.Request) {
|
|
||||||
if channel != nil {
|
|
||||||
if err := channel.Close(); err != nil {
|
|
||||||
log.Printf("Failed to close unused channel: %v", err)
|
|
||||||
}
|
|
||||||
go ssh.DiscardRequests(reqs)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hh *httpHandler) setupMiddlewares(hw stream.HTTP) {
|
|
||||||
fingerprintMiddleware := middleware.NewTunnelFingerprint()
|
|
||||||
forwardedForMiddleware := middleware.NewForwardedFor(hw.RemoteAddr())
|
|
||||||
|
|
||||||
hw.UseResponseMiddleware(fingerprintMiddleware)
|
|
||||||
hw.UseRequestMiddleware(forwardedForMiddleware)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (hh *httpHandler) sendInitialRequest(hw stream.HTTP, initialRequest header.RequestHeader, channel ssh.Channel) error {
|
|
||||||
hw.SetRequestHeader(initialRequest)
|
|
||||||
|
|
||||||
if err := hw.ApplyRequestMiddlewares(initialRequest); err != nil {
|
|
||||||
return fmt.Errorf("error applying request middlewares: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
if _, err := channel.Write(initialRequest.Finalize()); err != nil {
|
|
||||||
return fmt.Errorf("error writing to channel: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
package transport
|
|
||||||
|
|
||||||
import (
|
|
||||||
"crypto/tls"
|
|
||||||
"errors"
|
|
||||||
"log"
|
|
||||||
"net"
|
|
||||||
"tunnel_pls/internal/registry"
|
|
||||||
)
|
|
||||||
|
|
||||||
type https struct {
|
|
||||||
tlsConfig *tls.Config
|
|
||||||
httpHandler *httpHandler
|
|
||||||
domain string
|
|
||||||
port string
|
|
||||||
}
|
|
||||||
|
|
||||||
func NewHTTPSServer(domain, port string, sessionRegistry registry.Registry, redirectTLS bool, tlsConfig *tls.Config) Transport {
|
|
||||||
return &https{
|
|
||||||
tlsConfig: tlsConfig,
|
|
||||||
httpHandler: newHTTPHandler(domain, sessionRegistry, redirectTLS),
|
|
||||||
domain: domain,
|
|
||||||
port: port,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (ht *https) Listen() (net.Listener, error) {
|
|
||||||
return tls.Listen("tcp", ":"+ht.port, ht.tlsConfig)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (ht *https) Serve(listener net.Listener) error {
|
|
||||||
log.Printf("HTTPS server is starting on port %s", ht.port)
|
|
||||||
for {
|
|
||||||
conn, err := listener.Accept()
|
|
||||||
if err != nil {
|
|
||||||
if errors.Is(err, net.ErrClosed) {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
log.Printf("Error accepting connection: %v", err)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
go ht.httpHandler.handler(conn, true)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -1,66 +0,0 @@
|
|||||||
package transport
|
|
||||||
|
|
||||||
import (
|
|
||||||
"errors"
|
|
||||||
"fmt"
|
|
||||||
"io"
|
|
||||||
"log"
|
|
||||||
"net"
|
|
||||||
|
|
||||||
"golang.org/x/crypto/ssh"
|
|
||||||
)
|
|
||||||
|
|
||||||
type tcp struct {
|
|
||||||
port uint16
|
|
||||||
forwarder forwarder
|
|
||||||
}
|
|
||||||
|
|
||||||
type forwarder interface {
|
|
||||||
CreateForwardedTCPIPPayload(origin net.Addr) []byte
|
|
||||||
OpenForwardedChannel(payload []byte) (ssh.Channel, <-chan *ssh.Request, error)
|
|
||||||
HandleConnection(dst io.ReadWriter, src ssh.Channel)
|
|
||||||
}
|
|
||||||
|
|
||||||
func NewTCPServer(port uint16, forwarder forwarder) Transport {
|
|
||||||
return &tcp{
|
|
||||||
port: port,
|
|
||||||
forwarder: forwarder,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (tt *tcp) Listen() (net.Listener, error) {
|
|
||||||
return net.Listen("tcp", fmt.Sprintf("0.0.0.0:%d", tt.port))
|
|
||||||
}
|
|
||||||
|
|
||||||
func (tt *tcp) Serve(listener net.Listener) error {
|
|
||||||
for {
|
|
||||||
conn, err := listener.Accept()
|
|
||||||
if err != nil {
|
|
||||||
if errors.Is(err, net.ErrClosed) {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
log.Printf("Error accepting connection: %v", err)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
go tt.handleTcp(conn)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (tt *tcp) handleTcp(conn net.Conn) {
|
|
||||||
defer func() {
|
|
||||||
err := conn.Close()
|
|
||||||
if err != nil {
|
|
||||||
log.Printf("Failed to close connection: %v", err)
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
payload := tt.forwarder.CreateForwardedTCPIPPayload(conn.RemoteAddr())
|
|
||||||
channel, reqs, err := tt.forwarder.OpenForwardedChannel(payload)
|
|
||||||
if err != nil {
|
|
||||||
log.Printf("Failed to open forwarded-tcpip channel: %v", err)
|
|
||||||
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
go ssh.DiscardRequests(reqs)
|
|
||||||
tt.forwarder.HandleConnection(conn, channel)
|
|
||||||
}
|
|
||||||
@@ -1,10 +0,0 @@
|
|||||||
package transport
|
|
||||||
|
|
||||||
import (
|
|
||||||
"net"
|
|
||||||
)
|
|
||||||
|
|
||||||
type Transport interface {
|
|
||||||
Listen() (net.Listener, error)
|
|
||||||
Serve(listener net.Listener) error
|
|
||||||
}
|
|
||||||
@@ -4,22 +4,19 @@ import (
|
|||||||
"context"
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
"log"
|
"log"
|
||||||
"net"
|
|
||||||
"net/http"
|
"net/http"
|
||||||
_ "net/http/pprof"
|
_ "net/http/pprof"
|
||||||
"os"
|
"os"
|
||||||
"os/signal"
|
"os/signal"
|
||||||
|
"strings"
|
||||||
"syscall"
|
"syscall"
|
||||||
"time"
|
"time"
|
||||||
"tunnel_pls/internal/config"
|
"tunnel_pls/internal/config"
|
||||||
"tunnel_pls/internal/grpc/client"
|
"tunnel_pls/internal/grpc/client"
|
||||||
"tunnel_pls/internal/key"
|
"tunnel_pls/internal/key"
|
||||||
"tunnel_pls/internal/port"
|
|
||||||
"tunnel_pls/internal/registry"
|
|
||||||
"tunnel_pls/internal/transport"
|
|
||||||
"tunnel_pls/internal/version"
|
|
||||||
"tunnel_pls/server"
|
"tunnel_pls/server"
|
||||||
"tunnel_pls/types"
|
"tunnel_pls/session"
|
||||||
|
"tunnel_pls/version"
|
||||||
|
|
||||||
"golang.org/x/crypto/ssh"
|
"golang.org/x/crypto/ssh"
|
||||||
)
|
)
|
||||||
@@ -35,19 +32,28 @@ func main() {
|
|||||||
|
|
||||||
log.Printf("Starting %s", version.GetVersion())
|
log.Printf("Starting %s", version.GetVersion())
|
||||||
|
|
||||||
conf, err := config.MustLoad()
|
mode := strings.ToLower(config.Getenv("MODE", "standalone"))
|
||||||
if err != nil {
|
isNodeMode := mode == "node"
|
||||||
log.Fatalf("Failed to load configuration: %s", err)
|
|
||||||
return
|
pprofEnabled := config.Getenv("PPROF_ENABLED", "false")
|
||||||
|
if pprofEnabled == "true" {
|
||||||
|
pprofPort := config.Getenv("PPROF_PORT", "6060")
|
||||||
|
go func() {
|
||||||
|
pprofAddr := fmt.Sprintf("localhost:%s", pprofPort)
|
||||||
|
log.Printf("Starting pprof server on http://%s/debug/pprof/", pprofAddr)
|
||||||
|
if err := http.ListenAndServe(pprofAddr, nil); err != nil {
|
||||||
|
log.Printf("pprof server error: %v", err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
}
|
}
|
||||||
|
|
||||||
sshConfig := &ssh.ServerConfig{
|
sshConfig := &ssh.ServerConfig{
|
||||||
NoClientAuth: true,
|
NoClientAuth: true,
|
||||||
ServerVersion: fmt.Sprintf("SSH-2.0-TunnelPlease-%s", version.GetShortVersion()),
|
ServerVersion: fmt.Sprintf("SSH-2.0-TunnlPls-%s", version.GetShortVersion()),
|
||||||
}
|
}
|
||||||
|
|
||||||
sshKeyPath := "certs/ssh/id_rsa"
|
sshKeyPath := "certs/ssh/id_rsa"
|
||||||
if err = key.GenerateSSHKeyIfNotExist(sshKeyPath); err != nil {
|
if err := key.GenerateSSHKeyIfNotExist(sshKeyPath); err != nil {
|
||||||
log.Fatalf("Failed to generate SSH key: %s", err)
|
log.Fatalf("Failed to generate SSH key: %s", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -62,7 +68,7 @@ func main() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
sshConfig.AddHostKey(private)
|
sshConfig.AddHostKey(private)
|
||||||
sessionRegistry := registry.NewRegistry()
|
sessionRegistry := session.NewRegistry()
|
||||||
|
|
||||||
ctx, cancel := context.WithCancel(context.Background())
|
ctx, cancel := context.WithCancel(context.Background())
|
||||||
defer cancel()
|
defer cancel()
|
||||||
@@ -71,93 +77,55 @@ func main() {
|
|||||||
shutdownChan := make(chan os.Signal, 1)
|
shutdownChan := make(chan os.Signal, 1)
|
||||||
signal.Notify(shutdownChan, os.Interrupt, syscall.SIGTERM)
|
signal.Notify(shutdownChan, os.Interrupt, syscall.SIGTERM)
|
||||||
|
|
||||||
var grpcClient client.Client
|
var grpcClient *client.Client
|
||||||
|
if isNodeMode {
|
||||||
|
grpcHost := config.Getenv("GRPC_ADDRESS", "localhost")
|
||||||
|
grpcPort := config.Getenv("GRPC_PORT", "8080")
|
||||||
|
grpcAddr := fmt.Sprintf("%s:%s", grpcHost, grpcPort)
|
||||||
|
nodeToken := config.Getenv("NODE_TOKEN", "")
|
||||||
|
if nodeToken == "" {
|
||||||
|
log.Fatalf("NODE_TOKEN is required in node mode")
|
||||||
|
}
|
||||||
|
|
||||||
if conf.Mode() == types.ServerModeNODE {
|
c, err := client.New(&client.GrpcConfig{
|
||||||
grpcAddr := fmt.Sprintf("%s:%s", conf.GRPCAddress(), conf.GRPCPort())
|
Address: grpcAddr,
|
||||||
|
UseTLS: false,
|
||||||
grpcClient, err = client.New(conf, grpcAddr, sessionRegistry)
|
InsecureSkipVerify: false,
|
||||||
|
Timeout: 10 * time.Second,
|
||||||
|
KeepAlive: true,
|
||||||
|
MaxRetries: 3,
|
||||||
|
}, sessionRegistry)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatalf("failed to create grpc client: %v", err)
|
log.Fatalf("failed to create grpc client: %v", err)
|
||||||
}
|
}
|
||||||
|
grpcClient = c
|
||||||
|
|
||||||
healthCtx, healthCancel := context.WithTimeout(ctx, 5*time.Second)
|
healthCtx, healthCancel := context.WithTimeout(ctx, 5*time.Second)
|
||||||
if err = grpcClient.CheckServerHealth(healthCtx); err != nil {
|
if err := grpcClient.CheckServerHealth(healthCtx); err != nil {
|
||||||
healthCancel()
|
healthCancel()
|
||||||
log.Fatalf("gRPC health check failed: %v", err)
|
log.Fatalf("gRPC health check failed: %v", err)
|
||||||
}
|
}
|
||||||
healthCancel()
|
healthCancel()
|
||||||
|
|
||||||
go func() {
|
go func() {
|
||||||
if err = grpcClient.SubscribeEvents(ctx, conf.Domain(), conf.NodeToken()); err != nil {
|
identity := config.Getenv("DOMAIN", "localhost")
|
||||||
|
if err := grpcClient.SubscribeEvents(ctx, identity, nodeToken); err != nil {
|
||||||
errChan <- fmt.Errorf("failed to subscribe to events: %w", err)
|
errChan <- fmt.Errorf("failed to subscribe to events: %w", err)
|
||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
}
|
}
|
||||||
|
|
||||||
go func() {
|
go func() {
|
||||||
var httpListener net.Listener
|
app, err := server.NewServer(sshConfig, sessionRegistry, grpcClient)
|
||||||
httpserver := transport.NewHTTPServer(conf.Domain(), conf.HTTPPort(), sessionRegistry, conf.TLSRedirect())
|
|
||||||
httpListener, err = httpserver.Listen()
|
|
||||||
if err != nil {
|
|
||||||
errChan <- fmt.Errorf("failed to start http server: %w", err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
err = httpserver.Serve(httpListener)
|
|
||||||
if err != nil {
|
|
||||||
errChan <- fmt.Errorf("error when serving http server: %w", err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
|
|
||||||
if conf.TLSEnabled() {
|
|
||||||
go func() {
|
|
||||||
var httpsListener net.Listener
|
|
||||||
tlsConfig, _ := transport.NewTLSConfig(conf)
|
|
||||||
httpsServer := transport.NewHTTPSServer(conf.Domain(), conf.HTTPSPort(), sessionRegistry, conf.TLSRedirect(), tlsConfig)
|
|
||||||
httpsListener, err = httpsServer.Listen()
|
|
||||||
if err != nil {
|
|
||||||
errChan <- fmt.Errorf("failed to start http server: %w", err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
err = httpsServer.Serve(httpsListener)
|
|
||||||
if err != nil {
|
|
||||||
errChan <- fmt.Errorf("error when serving http server: %w", err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
}
|
|
||||||
|
|
||||||
portManager := port.New()
|
|
||||||
err = portManager.AddRange(conf.AllowedPortsStart(), conf.AllowedPortsEnd())
|
|
||||||
if err != nil {
|
|
||||||
log.Fatalf("Failed to initialize port manager: %s", err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
var app server.Server
|
|
||||||
go func() {
|
|
||||||
app, err = server.New(conf, sshConfig, sessionRegistry, grpcClient, portManager, conf.SSHPort())
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
errChan <- fmt.Errorf("failed to start server: %s", err)
|
errChan <- fmt.Errorf("failed to start server: %s", err)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
app.Start()
|
app.Start()
|
||||||
|
|
||||||
}()
|
}()
|
||||||
|
|
||||||
if conf.PprofEnabled() {
|
|
||||||
go func() {
|
|
||||||
pprofAddr := fmt.Sprintf("localhost:%s", conf.PprofPort())
|
|
||||||
log.Printf("Starting pprof server on http://%s/debug/pprof/", pprofAddr)
|
|
||||||
if err = http.ListenAndServe(pprofAddr, nil); err != nil {
|
|
||||||
log.Printf("pprof server error: %v", err)
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
}
|
|
||||||
|
|
||||||
select {
|
select {
|
||||||
case err = <-errChan:
|
case err := <-errChan:
|
||||||
log.Printf("error happen : %s", err)
|
log.Printf("error happen : %s", err)
|
||||||
case sig := <-shutdownChan:
|
case sig := <-shutdownChan:
|
||||||
log.Printf("received signal %s, shutting down", sig)
|
log.Printf("received signal %s, shutting down", sig)
|
||||||
@@ -165,14 +133,8 @@ func main() {
|
|||||||
|
|
||||||
cancel()
|
cancel()
|
||||||
|
|
||||||
if app != nil {
|
|
||||||
if err = app.Close(); err != nil {
|
|
||||||
log.Printf("failed to close server : %s", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if grpcClient != nil {
|
if grpcClient != nil {
|
||||||
if err = grpcClient.Close(); err != nil {
|
if err := grpcClient.Close(); err != nil {
|
||||||
log.Printf("failed to close grpc conn : %s", err)
|
log.Printf("failed to close grpc conn : %s", err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -0,0 +1,276 @@
|
|||||||
|
package server
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bufio"
|
||||||
|
"bytes"
|
||||||
|
"fmt"
|
||||||
|
)
|
||||||
|
|
||||||
|
type HeaderManager interface {
|
||||||
|
Get(key string) []byte
|
||||||
|
Set(key string, value []byte)
|
||||||
|
Remove(key string)
|
||||||
|
Finalize() []byte
|
||||||
|
}
|
||||||
|
|
||||||
|
type ResponseHeaderManager interface {
|
||||||
|
Get(key string) string
|
||||||
|
Set(key string, value string)
|
||||||
|
Remove(key string)
|
||||||
|
Finalize() []byte
|
||||||
|
}
|
||||||
|
|
||||||
|
type RequestHeaderManager interface {
|
||||||
|
Get(key string) string
|
||||||
|
Set(key string, value string)
|
||||||
|
Remove(key string)
|
||||||
|
Finalize() []byte
|
||||||
|
GetMethod() string
|
||||||
|
GetPath() string
|
||||||
|
GetVersion() string
|
||||||
|
}
|
||||||
|
|
||||||
|
type responseHeaderFactory struct {
|
||||||
|
startLine []byte
|
||||||
|
headers map[string]string
|
||||||
|
}
|
||||||
|
|
||||||
|
type requestHeaderFactory struct {
|
||||||
|
method string
|
||||||
|
path string
|
||||||
|
version string
|
||||||
|
startLine []byte
|
||||||
|
headers map[string]string
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewRequestHeaderFactory(r interface{}) (RequestHeaderManager, error) {
|
||||||
|
switch v := r.(type) {
|
||||||
|
case []byte:
|
||||||
|
return parseHeadersFromBytes(v)
|
||||||
|
case *bufio.Reader:
|
||||||
|
return parseHeadersFromReader(v)
|
||||||
|
default:
|
||||||
|
return nil, fmt.Errorf("unsupported type: %T", r)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func parseHeadersFromBytes(headerData []byte) (RequestHeaderManager, error) {
|
||||||
|
header := &requestHeaderFactory{
|
||||||
|
headers: make(map[string]string, 16),
|
||||||
|
}
|
||||||
|
|
||||||
|
lineEnd := bytes.IndexByte(headerData, '\n')
|
||||||
|
if lineEnd == -1 {
|
||||||
|
return nil, fmt.Errorf("invalid request: no newline found")
|
||||||
|
}
|
||||||
|
|
||||||
|
startLine := bytes.TrimRight(headerData[:lineEnd], "\r\n")
|
||||||
|
header.startLine = make([]byte, len(startLine))
|
||||||
|
copy(header.startLine, startLine)
|
||||||
|
|
||||||
|
parts := bytes.Split(startLine, []byte{' '})
|
||||||
|
if len(parts) < 3 {
|
||||||
|
return nil, fmt.Errorf("invalid request line")
|
||||||
|
}
|
||||||
|
|
||||||
|
header.method = string(parts[0])
|
||||||
|
header.path = string(parts[1])
|
||||||
|
header.version = string(parts[2])
|
||||||
|
|
||||||
|
remaining := headerData[lineEnd+1:]
|
||||||
|
|
||||||
|
for len(remaining) > 0 {
|
||||||
|
lineEnd = bytes.IndexByte(remaining, '\n')
|
||||||
|
if lineEnd == -1 {
|
||||||
|
lineEnd = len(remaining)
|
||||||
|
}
|
||||||
|
|
||||||
|
line := bytes.TrimRight(remaining[:lineEnd], "\r\n")
|
||||||
|
|
||||||
|
if len(line) == 0 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
|
||||||
|
colonIdx := bytes.IndexByte(line, ':')
|
||||||
|
if colonIdx != -1 {
|
||||||
|
key := bytes.TrimSpace(line[:colonIdx])
|
||||||
|
value := bytes.TrimSpace(line[colonIdx+1:])
|
||||||
|
header.headers[string(key)] = string(value)
|
||||||
|
}
|
||||||
|
|
||||||
|
if lineEnd == len(remaining) {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
remaining = remaining[lineEnd+1:]
|
||||||
|
}
|
||||||
|
|
||||||
|
return header, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func parseHeadersFromReader(br *bufio.Reader) (RequestHeaderManager, error) {
|
||||||
|
header := &requestHeaderFactory{
|
||||||
|
headers: make(map[string]string, 16),
|
||||||
|
}
|
||||||
|
|
||||||
|
startLineBytes, err := br.ReadSlice('\n')
|
||||||
|
if err != nil {
|
||||||
|
if err == bufio.ErrBufferFull {
|
||||||
|
var startLine string
|
||||||
|
startLine, err = br.ReadString('\n')
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
startLineBytes = []byte(startLine)
|
||||||
|
} else {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
startLineBytes = bytes.TrimRight(startLineBytes, "\r\n")
|
||||||
|
header.startLine = make([]byte, len(startLineBytes))
|
||||||
|
copy(header.startLine, startLineBytes)
|
||||||
|
|
||||||
|
parts := bytes.Split(startLineBytes, []byte{' '})
|
||||||
|
if len(parts) < 3 {
|
||||||
|
return nil, fmt.Errorf("invalid request line")
|
||||||
|
}
|
||||||
|
|
||||||
|
header.method = string(parts[0])
|
||||||
|
header.path = string(parts[1])
|
||||||
|
header.version = string(parts[2])
|
||||||
|
|
||||||
|
for {
|
||||||
|
lineBytes, err := br.ReadSlice('\n')
|
||||||
|
if err != nil {
|
||||||
|
if err == bufio.ErrBufferFull {
|
||||||
|
var line string
|
||||||
|
line, err = br.ReadString('\n')
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
lineBytes = []byte(line)
|
||||||
|
} else {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
lineBytes = bytes.TrimRight(lineBytes, "\r\n")
|
||||||
|
|
||||||
|
if len(lineBytes) == 0 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
|
||||||
|
colonIdx := bytes.IndexByte(lineBytes, ':')
|
||||||
|
if colonIdx == -1 {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
key := bytes.TrimSpace(lineBytes[:colonIdx])
|
||||||
|
value := bytes.TrimSpace(lineBytes[colonIdx+1:])
|
||||||
|
|
||||||
|
header.headers[string(key)] = string(value)
|
||||||
|
}
|
||||||
|
|
||||||
|
return header, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewResponseHeaderFactory(startLine []byte) ResponseHeaderManager {
|
||||||
|
header := &responseHeaderFactory{
|
||||||
|
startLine: nil,
|
||||||
|
headers: make(map[string]string),
|
||||||
|
}
|
||||||
|
lines := bytes.Split(startLine, []byte("\r\n"))
|
||||||
|
if len(lines) == 0 {
|
||||||
|
return header
|
||||||
|
}
|
||||||
|
header.startLine = lines[0]
|
||||||
|
for _, h := range lines[1:] {
|
||||||
|
if len(h) == 0 {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
parts := bytes.SplitN(h, []byte(":"), 2)
|
||||||
|
if len(parts) < 2 {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
key := parts[0]
|
||||||
|
val := bytes.TrimSpace(parts[1])
|
||||||
|
header.headers[string(key)] = string(val)
|
||||||
|
}
|
||||||
|
return header
|
||||||
|
}
|
||||||
|
|
||||||
|
func (resp *responseHeaderFactory) Get(key string) string {
|
||||||
|
return resp.headers[key]
|
||||||
|
}
|
||||||
|
|
||||||
|
func (resp *responseHeaderFactory) Set(key string, value string) {
|
||||||
|
resp.headers[key] = value
|
||||||
|
}
|
||||||
|
|
||||||
|
func (resp *responseHeaderFactory) Remove(key string) {
|
||||||
|
delete(resp.headers, key)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (resp *responseHeaderFactory) Finalize() []byte {
|
||||||
|
var buf bytes.Buffer
|
||||||
|
|
||||||
|
buf.Write(resp.startLine)
|
||||||
|
buf.WriteString("\r\n")
|
||||||
|
|
||||||
|
for key, val := range resp.headers {
|
||||||
|
buf.WriteString(key)
|
||||||
|
buf.WriteString(": ")
|
||||||
|
buf.WriteString(val)
|
||||||
|
buf.WriteString("\r\n")
|
||||||
|
}
|
||||||
|
|
||||||
|
buf.WriteString("\r\n")
|
||||||
|
return buf.Bytes()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (req *requestHeaderFactory) Get(key string) string {
|
||||||
|
val, ok := req.headers[key]
|
||||||
|
if !ok {
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
return val
|
||||||
|
}
|
||||||
|
|
||||||
|
func (req *requestHeaderFactory) Set(key string, value string) {
|
||||||
|
req.headers[key] = value
|
||||||
|
}
|
||||||
|
|
||||||
|
func (req *requestHeaderFactory) Remove(key string) {
|
||||||
|
delete(req.headers, key)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (req *requestHeaderFactory) GetMethod() string {
|
||||||
|
return req.method
|
||||||
|
}
|
||||||
|
|
||||||
|
func (req *requestHeaderFactory) GetPath() string {
|
||||||
|
return req.path
|
||||||
|
}
|
||||||
|
|
||||||
|
func (req *requestHeaderFactory) GetVersion() string {
|
||||||
|
return req.version
|
||||||
|
}
|
||||||
|
|
||||||
|
func (req *requestHeaderFactory) Finalize() []byte {
|
||||||
|
var buf bytes.Buffer
|
||||||
|
|
||||||
|
buf.Write(req.startLine)
|
||||||
|
buf.WriteString("\r\n")
|
||||||
|
|
||||||
|
for key, val := range req.headers {
|
||||||
|
buf.WriteString(key)
|
||||||
|
buf.WriteString(": ")
|
||||||
|
buf.WriteString(val)
|
||||||
|
buf.WriteString("\r\n")
|
||||||
|
}
|
||||||
|
|
||||||
|
buf.WriteString("\r\n")
|
||||||
|
return buf.Bytes()
|
||||||
|
}
|
||||||
+395
@@ -0,0 +1,395 @@
|
|||||||
|
package server
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bufio"
|
||||||
|
"bytes"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"log"
|
||||||
|
"net"
|
||||||
|
"regexp"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
"tunnel_pls/internal/config"
|
||||||
|
"tunnel_pls/session"
|
||||||
|
"tunnel_pls/types"
|
||||||
|
|
||||||
|
"golang.org/x/crypto/ssh"
|
||||||
|
)
|
||||||
|
|
||||||
|
type HTTPWriter interface {
|
||||||
|
io.Reader
|
||||||
|
io.Writer
|
||||||
|
GetRemoteAddr() net.Addr
|
||||||
|
GetWriter() io.Writer
|
||||||
|
AddResponseMiddleware(mw ResponseMiddleware)
|
||||||
|
AddRequestStartMiddleware(mw RequestMiddleware)
|
||||||
|
SetRequestHeader(header RequestHeaderManager)
|
||||||
|
GetRequestStartMiddleware() []RequestMiddleware
|
||||||
|
}
|
||||||
|
|
||||||
|
type customWriter struct {
|
||||||
|
remoteAddr net.Addr
|
||||||
|
writer io.Writer
|
||||||
|
reader io.Reader
|
||||||
|
headerBuf []byte
|
||||||
|
buf []byte
|
||||||
|
respHeader ResponseHeaderManager
|
||||||
|
reqHeader RequestHeaderManager
|
||||||
|
respMW []ResponseMiddleware
|
||||||
|
reqStartMW []RequestMiddleware
|
||||||
|
reqEndMW []RequestMiddleware
|
||||||
|
}
|
||||||
|
|
||||||
|
func (cw *customWriter) GetRemoteAddr() net.Addr {
|
||||||
|
return cw.remoteAddr
|
||||||
|
}
|
||||||
|
|
||||||
|
func (cw *customWriter) GetWriter() io.Writer {
|
||||||
|
return cw.writer
|
||||||
|
}
|
||||||
|
|
||||||
|
func (cw *customWriter) AddResponseMiddleware(mw ResponseMiddleware) {
|
||||||
|
cw.respMW = append(cw.respMW, mw)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (cw *customWriter) AddRequestStartMiddleware(mw RequestMiddleware) {
|
||||||
|
cw.reqStartMW = append(cw.reqStartMW, mw)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (cw *customWriter) SetRequestHeader(header RequestHeaderManager) {
|
||||||
|
cw.reqHeader = header
|
||||||
|
}
|
||||||
|
|
||||||
|
func (cw *customWriter) GetRequestStartMiddleware() []RequestMiddleware {
|
||||||
|
return cw.reqStartMW
|
||||||
|
}
|
||||||
|
|
||||||
|
func (cw *customWriter) Read(p []byte) (int, error) {
|
||||||
|
tmp := make([]byte, len(p))
|
||||||
|
read, err := cw.reader.Read(tmp)
|
||||||
|
if read == 0 && err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
|
||||||
|
tmp = tmp[:read]
|
||||||
|
|
||||||
|
idx := bytes.Index(tmp, DELIMITER)
|
||||||
|
if idx == -1 {
|
||||||
|
copy(p, tmp)
|
||||||
|
if err != nil {
|
||||||
|
return read, err
|
||||||
|
}
|
||||||
|
return read, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
header := tmp[:idx+len(DELIMITER)]
|
||||||
|
body := tmp[idx+len(DELIMITER):]
|
||||||
|
|
||||||
|
if !isHTTPHeader(header) {
|
||||||
|
copy(p, tmp)
|
||||||
|
return read, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, m := range cw.reqEndMW {
|
||||||
|
err = m.HandleRequest(cw.reqHeader)
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("Error when applying request middleware: %v", err)
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
reqhf, err := NewRequestHeaderFactory(header)
|
||||||
|
if err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, m := range cw.reqStartMW {
|
||||||
|
if mwErr := m.HandleRequest(reqhf); mwErr != nil {
|
||||||
|
log.Printf("Error when applying request middleware: %v", mwErr)
|
||||||
|
return 0, mwErr
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
cw.reqHeader = reqhf
|
||||||
|
finalHeader := reqhf.Finalize()
|
||||||
|
|
||||||
|
combined := append(finalHeader, body...)
|
||||||
|
|
||||||
|
n := copy(p, combined)
|
||||||
|
|
||||||
|
return n, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewCustomWriter(writer io.Writer, reader io.Reader, remoteAddr net.Addr) HTTPWriter {
|
||||||
|
return &customWriter{
|
||||||
|
remoteAddr: remoteAddr,
|
||||||
|
writer: writer,
|
||||||
|
reader: reader,
|
||||||
|
buf: make([]byte, 0, 4096),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
var DELIMITER = []byte{0x0D, 0x0A, 0x0D, 0x0A}
|
||||||
|
var requestLine = regexp.MustCompile(`^(GET|POST|PUT|DELETE|HEAD|OPTIONS|PATCH|TRACE|CONNECT) \S+ HTTP/\d\.\d$`)
|
||||||
|
var responseLine = regexp.MustCompile(`^HTTP/\d\.\d \d{3} .+`)
|
||||||
|
|
||||||
|
func isHTTPHeader(buf []byte) bool {
|
||||||
|
lines := bytes.Split(buf, []byte("\r\n"))
|
||||||
|
|
||||||
|
startLine := string(lines[0])
|
||||||
|
if !requestLine.MatchString(startLine) && !responseLine.MatchString(startLine) {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, line := range lines[1:] {
|
||||||
|
if len(line) == 0 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
colonIdx := bytes.IndexByte(line, ':')
|
||||||
|
if colonIdx <= 0 {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
func (cw *customWriter) Write(p []byte) (int, error) {
|
||||||
|
if cw.respHeader != nil && len(cw.buf) == 0 && len(p) >= 5 && string(p[0:5]) == "HTTP/" {
|
||||||
|
cw.respHeader = nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if cw.respHeader != nil {
|
||||||
|
n, err := cw.writer.Write(p)
|
||||||
|
if err != nil {
|
||||||
|
return n, err
|
||||||
|
}
|
||||||
|
return n, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
cw.buf = append(cw.buf, p...)
|
||||||
|
|
||||||
|
idx := bytes.Index(cw.buf, DELIMITER)
|
||||||
|
if idx == -1 {
|
||||||
|
return len(p), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
header := cw.buf[:idx+len(DELIMITER)]
|
||||||
|
body := cw.buf[idx+len(DELIMITER):]
|
||||||
|
|
||||||
|
if !isHTTPHeader(header) {
|
||||||
|
_, err := cw.writer.Write(cw.buf)
|
||||||
|
cw.buf = nil
|
||||||
|
if err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
return len(p), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
resphf := NewResponseHeaderFactory(header)
|
||||||
|
for _, m := range cw.respMW {
|
||||||
|
err := m.HandleResponse(resphf, body)
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("Cannot apply middleware: %s\n", err)
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
header = resphf.Finalize()
|
||||||
|
cw.respHeader = resphf
|
||||||
|
|
||||||
|
_, err := cw.writer.Write(header)
|
||||||
|
if err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
if len(body) > 0 {
|
||||||
|
_, err = cw.writer.Write(body)
|
||||||
|
if err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
cw.buf = nil
|
||||||
|
return len(p), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
var redirectTLS = false
|
||||||
|
|
||||||
|
type HTTPServer interface {
|
||||||
|
ListenAndServe() error
|
||||||
|
ListenAndServeTLS() error
|
||||||
|
handler(conn net.Conn)
|
||||||
|
handlerTLS(conn net.Conn)
|
||||||
|
}
|
||||||
|
type httpServer struct {
|
||||||
|
sessionRegistry session.Registry
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewHTTPServer(sessionRegistry session.Registry) HTTPServer {
|
||||||
|
return &httpServer{sessionRegistry: sessionRegistry}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *httpServer) ListenAndServe() error {
|
||||||
|
httpPort := config.Getenv("HTTP_PORT", "8080")
|
||||||
|
listener, err := net.Listen("tcp", ":"+httpPort)
|
||||||
|
if err != nil {
|
||||||
|
return errors.New("Error listening: " + err.Error())
|
||||||
|
}
|
||||||
|
if config.Getenv("TLS_ENABLED", "false") == "true" && config.Getenv("TLS_REDIRECT", "false") == "true" {
|
||||||
|
redirectTLS = true
|
||||||
|
}
|
||||||
|
go func() {
|
||||||
|
for {
|
||||||
|
var conn net.Conn
|
||||||
|
conn, err = listener.Accept()
|
||||||
|
if err != nil {
|
||||||
|
if errors.Is(err, net.ErrClosed) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
log.Printf("Error accepting connection: %v", err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
go hs.handler(conn)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *httpServer) handler(conn net.Conn) {
|
||||||
|
defer func() {
|
||||||
|
err := conn.Close()
|
||||||
|
if err != nil && !errors.Is(err, net.ErrClosed) {
|
||||||
|
log.Printf("Error closing connection: %v", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}()
|
||||||
|
|
||||||
|
dstReader := bufio.NewReader(conn)
|
||||||
|
reqhf, err := NewRequestHeaderFactory(dstReader)
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("Error creating request header: %v", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
host := strings.Split(reqhf.Get("Host"), ".")
|
||||||
|
if len(host) < 1 {
|
||||||
|
_, err := conn.Write([]byte("HTTP/1.1 400 Bad Request\r\n\r\n"))
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to write 400 Bad Request:", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
slug := host[0]
|
||||||
|
|
||||||
|
if redirectTLS {
|
||||||
|
_, err = conn.Write([]byte("HTTP/1.1 301 Moved Permanently\r\n" +
|
||||||
|
fmt.Sprintf("Location: https://%s.%s/\r\n", slug, config.Getenv("DOMAIN", "localhost")) +
|
||||||
|
"Content-Length: 0\r\n" +
|
||||||
|
"Connection: close\r\n" +
|
||||||
|
"\r\n"))
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to write 301 Moved Permanently:", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if slug == "ping" {
|
||||||
|
_, err = conn.Write([]byte(
|
||||||
|
"HTTP/1.1 200 OK\r\n" +
|
||||||
|
"Content-Length: 0\r\n" +
|
||||||
|
"Connection: close\r\n" +
|
||||||
|
"Access-Control-Allow-Origin: *\r\n" +
|
||||||
|
"Access-Control-Allow-Methods: GET, HEAD, OPTIONS\r\n" +
|
||||||
|
"Access-Control-Allow-Headers: *\r\n" +
|
||||||
|
"\r\n",
|
||||||
|
))
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to write 200 OK:", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
sshSession, err := hs.sessionRegistry.Get(types.SessionKey{
|
||||||
|
Id: slug,
|
||||||
|
Type: types.HTTP,
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
_, err = conn.Write([]byte("HTTP/1.1 301 Moved Permanently\r\n" +
|
||||||
|
fmt.Sprintf("Location: https://tunnl.live/tunnel-not-found?slug=%s\r\n", slug) +
|
||||||
|
"Content-Length: 0\r\n" +
|
||||||
|
"Connection: close\r\n" +
|
||||||
|
"\r\n"))
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to write 301 Moved Permanently:", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
cw := NewCustomWriter(conn, dstReader, conn.RemoteAddr())
|
||||||
|
forwardRequest(cw, reqhf, sshSession)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func forwardRequest(cw HTTPWriter, initialRequest RequestHeaderManager, sshSession *session.SSHSession) {
|
||||||
|
payload := sshSession.GetForwarder().CreateForwardedTCPIPPayload(cw.GetRemoteAddr())
|
||||||
|
|
||||||
|
type channelResult struct {
|
||||||
|
channel ssh.Channel
|
||||||
|
reqs <-chan *ssh.Request
|
||||||
|
err error
|
||||||
|
}
|
||||||
|
resultChan := make(chan channelResult, 1)
|
||||||
|
|
||||||
|
go func() {
|
||||||
|
channel, reqs, err := sshSession.GetLifecycle().GetConnection().OpenChannel("forwarded-tcpip", payload)
|
||||||
|
resultChan <- channelResult{channel, reqs, err}
|
||||||
|
}()
|
||||||
|
|
||||||
|
var channel ssh.Channel
|
||||||
|
var reqs <-chan *ssh.Request
|
||||||
|
|
||||||
|
select {
|
||||||
|
case result := <-resultChan:
|
||||||
|
if result.err != nil {
|
||||||
|
log.Printf("Failed to open forwarded-tcpip channel: %v", result.err)
|
||||||
|
sshSession.GetForwarder().WriteBadGatewayResponse(cw.GetWriter())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
channel = result.channel
|
||||||
|
reqs = result.reqs
|
||||||
|
case <-time.After(5 * time.Second):
|
||||||
|
log.Printf("Timeout opening forwarded-tcpip channel")
|
||||||
|
sshSession.GetForwarder().WriteBadGatewayResponse(cw.GetWriter())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
go ssh.DiscardRequests(reqs)
|
||||||
|
|
||||||
|
fingerprintMiddleware := NewTunnelFingerprint()
|
||||||
|
forwardedForMiddleware := NewForwardedFor(cw.GetRemoteAddr())
|
||||||
|
|
||||||
|
cw.AddResponseMiddleware(fingerprintMiddleware)
|
||||||
|
cw.AddRequestStartMiddleware(forwardedForMiddleware)
|
||||||
|
cw.SetRequestHeader(initialRequest)
|
||||||
|
|
||||||
|
for _, m := range cw.GetRequestStartMiddleware() {
|
||||||
|
if err := m.HandleRequest(initialRequest); err != nil {
|
||||||
|
log.Printf("Error handling request: %v", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err := channel.Write(initialRequest.Finalize())
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("Failed to forward request: %v", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
sshSession.GetForwarder().HandleConnection(cw, channel, cw.GetRemoteAddr())
|
||||||
|
return
|
||||||
|
}
|
||||||
+112
@@ -0,0 +1,112 @@
|
|||||||
|
package server
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bufio"
|
||||||
|
"crypto/tls"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"log"
|
||||||
|
"net"
|
||||||
|
"strings"
|
||||||
|
"tunnel_pls/internal/config"
|
||||||
|
"tunnel_pls/types"
|
||||||
|
)
|
||||||
|
|
||||||
|
func (hs *httpServer) ListenAndServeTLS() error {
|
||||||
|
domain := config.Getenv("DOMAIN", "localhost")
|
||||||
|
httpsPort := config.Getenv("HTTPS_PORT", "8443")
|
||||||
|
|
||||||
|
tlsConfig, err := NewTLSConfig(domain)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to initialize TLS config: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
ln, err := tls.Listen("tcp", ":"+httpsPort, tlsConfig)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
go func() {
|
||||||
|
for {
|
||||||
|
var conn net.Conn
|
||||||
|
conn, err = ln.Accept()
|
||||||
|
if err != nil {
|
||||||
|
if errors.Is(err, net.ErrClosed) {
|
||||||
|
log.Println("https server closed")
|
||||||
|
}
|
||||||
|
log.Printf("Error accepting connection: %v", err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
go hs.handlerTLS(conn)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *httpServer) handlerTLS(conn net.Conn) {
|
||||||
|
defer func() {
|
||||||
|
err := conn.Close()
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("Error closing connection: %v", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}()
|
||||||
|
|
||||||
|
dstReader := bufio.NewReader(conn)
|
||||||
|
reqhf, err := NewRequestHeaderFactory(dstReader)
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("Error creating request header: %v", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
host := strings.Split(reqhf.Get("Host"), ".")
|
||||||
|
if len(host) < 1 {
|
||||||
|
_, err = conn.Write([]byte("HTTP/1.1 400 Bad Request\r\n\r\n"))
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to write 400 Bad Request:", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
slug := host[0]
|
||||||
|
|
||||||
|
if slug == "ping" {
|
||||||
|
_, err = conn.Write([]byte(
|
||||||
|
"HTTP/1.1 200 OK\r\n" +
|
||||||
|
"Content-Length: 0\r\n" +
|
||||||
|
"Connection: close\r\n" +
|
||||||
|
"Access-Control-Allow-Origin: *\r\n" +
|
||||||
|
"Access-Control-Allow-Methods: GET, HEAD, OPTIONS\r\n" +
|
||||||
|
"Access-Control-Allow-Headers: *\r\n" +
|
||||||
|
"\r\n",
|
||||||
|
))
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to write 200 OK:", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
sshSession, err := hs.sessionRegistry.Get(types.SessionKey{
|
||||||
|
Id: slug,
|
||||||
|
Type: types.HTTP,
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
_, err = conn.Write([]byte("HTTP/1.1 301 Moved Permanently\r\n" +
|
||||||
|
fmt.Sprintf("Location: https://tunnl.live/tunnel-not-found?slug=%s\r\n", slug) +
|
||||||
|
"Content-Length: 0\r\n" +
|
||||||
|
"Connection: close\r\n" +
|
||||||
|
"\r\n"))
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to write 301 Moved Permanently:", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
cw := NewCustomWriter(conn, dstReader, conn.RemoteAddr())
|
||||||
|
forwardRequest(cw, reqhf, sshSession)
|
||||||
|
return
|
||||||
|
}
|
||||||
@@ -0,0 +1,41 @@
|
|||||||
|
package server
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net"
|
||||||
|
)
|
||||||
|
|
||||||
|
type RequestMiddleware interface {
|
||||||
|
HandleRequest(header RequestHeaderManager) error
|
||||||
|
}
|
||||||
|
|
||||||
|
type ResponseMiddleware interface {
|
||||||
|
HandleResponse(header ResponseHeaderManager, body []byte) error
|
||||||
|
}
|
||||||
|
|
||||||
|
type TunnelFingerprint struct{}
|
||||||
|
|
||||||
|
func NewTunnelFingerprint() *TunnelFingerprint {
|
||||||
|
return &TunnelFingerprint{}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *TunnelFingerprint) HandleResponse(header ResponseHeaderManager, body []byte) error {
|
||||||
|
header.Set("Server", "Tunnel Please")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
type ForwardedFor struct {
|
||||||
|
addr net.Addr
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewForwardedFor(addr net.Addr) *ForwardedFor {
|
||||||
|
return &ForwardedFor{addr: addr}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ff *ForwardedFor) HandleRequest(header RequestHeaderManager) error {
|
||||||
|
host, _, err := net.SplitHostPort(ff.addr.String())
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
header.Set("X-Forwarded-For", host)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
+33
-37
@@ -9,53 +9,53 @@ import (
|
|||||||
"time"
|
"time"
|
||||||
"tunnel_pls/internal/config"
|
"tunnel_pls/internal/config"
|
||||||
"tunnel_pls/internal/grpc/client"
|
"tunnel_pls/internal/grpc/client"
|
||||||
"tunnel_pls/internal/port"
|
|
||||||
"tunnel_pls/internal/registry"
|
|
||||||
"tunnel_pls/session"
|
"tunnel_pls/session"
|
||||||
|
|
||||||
"golang.org/x/crypto/ssh"
|
"golang.org/x/crypto/ssh"
|
||||||
)
|
)
|
||||||
|
|
||||||
type Server interface {
|
type Server struct {
|
||||||
Start()
|
conn *net.Listener
|
||||||
Close() error
|
config *ssh.ServerConfig
|
||||||
}
|
sessionRegistry session.Registry
|
||||||
type server struct {
|
grpcClient *client.Client
|
||||||
config config.Config
|
|
||||||
sshPort string
|
|
||||||
sshListener net.Listener
|
|
||||||
sshConfig *ssh.ServerConfig
|
|
||||||
grpcClient client.Client
|
|
||||||
sessionRegistry registry.Registry
|
|
||||||
portRegistry port.Port
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func New(config config.Config, sshConfig *ssh.ServerConfig, sessionRegistry registry.Registry, grpcClient client.Client, portRegistry port.Port, sshPort string) (Server, error) {
|
func NewServer(sshConfig *ssh.ServerConfig, sessionRegistry session.Registry, grpcClient *client.Client) (*Server, error) {
|
||||||
listener, err := net.Listen("tcp", fmt.Sprintf(":%s", sshPort))
|
listener, err := net.Listen("tcp", fmt.Sprintf(":%s", config.Getenv("PORT", "2200")))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
log.Fatalf("failed to listen on port 2200: %v", err)
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
return &server{
|
HttpServer := NewHTTPServer(sessionRegistry)
|
||||||
config: config,
|
err = HttpServer.ListenAndServe()
|
||||||
sshPort: sshPort,
|
if err != nil {
|
||||||
sshListener: listener,
|
log.Fatalf("failed to start http server: %v", err)
|
||||||
sshConfig: sshConfig,
|
return nil, err
|
||||||
grpcClient: grpcClient,
|
}
|
||||||
|
|
||||||
|
if config.Getenv("TLS_ENABLED", "false") == "true" {
|
||||||
|
err = HttpServer.ListenAndServeTLS()
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("failed to start https server: %v", err)
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return &Server{
|
||||||
|
conn: &listener,
|
||||||
|
config: sshConfig,
|
||||||
sessionRegistry: sessionRegistry,
|
sessionRegistry: sessionRegistry,
|
||||||
portRegistry: portRegistry,
|
grpcClient: grpcClient,
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *server) Start() {
|
func (s *Server) Start() {
|
||||||
log.Printf("SSH server is starting on port %s", s.sshPort)
|
log.Println("SSH server is starting on port 2200...")
|
||||||
for {
|
for {
|
||||||
conn, err := s.sshListener.Accept()
|
conn, err := (*s.conn).Accept()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if errors.Is(err, net.ErrClosed) {
|
|
||||||
log.Println("listener closed, stopping server")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
log.Printf("failed to accept connection: %v", err)
|
log.Printf("failed to accept connection: %v", err)
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
@@ -64,12 +64,8 @@ func (s *server) Start() {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *server) Close() error {
|
func (s *Server) handleConnection(conn net.Conn) {
|
||||||
return s.sshListener.Close()
|
sshConn, chans, forwardingReqs, err := ssh.NewServerConn(conn, s.config)
|
||||||
}
|
|
||||||
|
|
||||||
func (s *server) handleConnection(conn net.Conn) {
|
|
||||||
sshConn, chans, forwardingReqs, err := ssh.NewServerConn(conn, s.sshConfig)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Printf("failed to establish SSH connection: %v", err)
|
log.Printf("failed to establish SSH connection: %v", err)
|
||||||
err = conn.Close()
|
err = conn.Close()
|
||||||
@@ -95,7 +91,7 @@ func (s *server) handleConnection(conn net.Conn) {
|
|||||||
cancel()
|
cancel()
|
||||||
}
|
}
|
||||||
log.Println("SSH connection established:", sshConn.User())
|
log.Println("SSH connection established:", sshConn.User())
|
||||||
sshSession := session.New(s.config, sshConn, forwardingReqs, chans, s.sessionRegistry, s.portRegistry, user)
|
sshSession := session.New(sshConn, forwardingReqs, chans, s.sessionRegistry, user)
|
||||||
err = sshSession.Start()
|
err = sshSession.Start()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Printf("SSH session ended with error: %v", err)
|
log.Printf("SSH session ended with error: %v", err)
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
package transport
|
package server
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
@@ -26,8 +26,7 @@ type TLSManager interface {
|
|||||||
}
|
}
|
||||||
|
|
||||||
type tlsManager struct {
|
type tlsManager struct {
|
||||||
config config.Config
|
domain string
|
||||||
|
|
||||||
certPath string
|
certPath string
|
||||||
keyPath string
|
keyPath string
|
||||||
storagePath string
|
storagePath string
|
||||||
@@ -43,7 +42,7 @@ type tlsManager struct {
|
|||||||
var globalTLSManager TLSManager
|
var globalTLSManager TLSManager
|
||||||
var tlsManagerOnce sync.Once
|
var tlsManagerOnce sync.Once
|
||||||
|
|
||||||
func NewTLSConfig(config config.Config) (*tls.Config, error) {
|
func NewTLSConfig(domain string) (*tls.Config, error) {
|
||||||
var initErr error
|
var initErr error
|
||||||
|
|
||||||
tlsManagerOnce.Do(func() {
|
tlsManagerOnce.Do(func() {
|
||||||
@@ -52,7 +51,7 @@ func NewTLSConfig(config config.Config) (*tls.Config, error) {
|
|||||||
storagePath := "certs/tls/certmagic"
|
storagePath := "certs/tls/certmagic"
|
||||||
|
|
||||||
tm := &tlsManager{
|
tm := &tlsManager{
|
||||||
config: config,
|
domain: domain,
|
||||||
certPath: certPath,
|
certPath: certPath,
|
||||||
keyPath: keyPath,
|
keyPath: keyPath,
|
||||||
storagePath: storagePath,
|
storagePath: storagePath,
|
||||||
@@ -67,7 +66,14 @@ func NewTLSConfig(config config.Config) (*tls.Config, error) {
|
|||||||
tm.useCertMagic = false
|
tm.useCertMagic = false
|
||||||
tm.startCertWatcher()
|
tm.startCertWatcher()
|
||||||
} else {
|
} else {
|
||||||
log.Printf("User certificates missing or don't cover %s and *.%s, using CertMagic", config.Domain(), config.Domain())
|
if !isACMEConfigComplete() {
|
||||||
|
log.Printf("User certificates missing or invalid, and ACME configuration is incomplete")
|
||||||
|
log.Printf("To enable automatic certificate generation, set CF_API_TOKEN environment variable")
|
||||||
|
initErr = fmt.Errorf("no valid certificates found and ACME configuration is incomplete (CF_API_TOKEN is required)")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Printf("User certificates missing or don't cover %s and *.%s, using CertMagic", domain, domain)
|
||||||
if err := tm.initCertMagic(); err != nil {
|
if err := tm.initCertMagic(); err != nil {
|
||||||
initErr = fmt.Errorf("failed to initialize CertMagic: %w", err)
|
initErr = fmt.Errorf("failed to initialize CertMagic: %w", err)
|
||||||
return
|
return
|
||||||
@@ -85,6 +91,11 @@ func NewTLSConfig(config config.Config) (*tls.Config, error) {
|
|||||||
return globalTLSManager.getTLSConfig(), nil
|
return globalTLSManager.getTLSConfig(), nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func isACMEConfigComplete() bool {
|
||||||
|
cfAPIToken := config.Getenv("CF_API_TOKEN", "")
|
||||||
|
return cfAPIToken != ""
|
||||||
|
}
|
||||||
|
|
||||||
func (tm *tlsManager) userCertsExistAndValid() bool {
|
func (tm *tlsManager) userCertsExistAndValid() bool {
|
||||||
if _, err := os.Stat(tm.certPath); os.IsNotExist(err) {
|
if _, err := os.Stat(tm.certPath); os.IsNotExist(err) {
|
||||||
log.Printf("Certificate file not found: %s", tm.certPath)
|
log.Printf("Certificate file not found: %s", tm.certPath)
|
||||||
@@ -95,7 +106,7 @@ func (tm *tlsManager) userCertsExistAndValid() bool {
|
|||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
return ValidateCertDomains(tm.certPath, tm.config.Domain())
|
return ValidateCertDomains(tm.certPath, tm.domain)
|
||||||
}
|
}
|
||||||
|
|
||||||
func ValidateCertDomains(certPath, domain string) bool {
|
func ValidateCertDomains(certPath, domain string) bool {
|
||||||
@@ -195,9 +206,15 @@ func (tm *tlsManager) startCertWatcher() {
|
|||||||
if certInfo.ModTime().After(lastCertMod) || keyInfo.ModTime().After(lastKeyMod) {
|
if certInfo.ModTime().After(lastCertMod) || keyInfo.ModTime().After(lastKeyMod) {
|
||||||
log.Printf("Certificate files changed, reloading...")
|
log.Printf("Certificate files changed, reloading...")
|
||||||
|
|
||||||
if !ValidateCertDomains(tm.certPath, tm.config.Domain()) {
|
if !ValidateCertDomains(tm.certPath, tm.domain) {
|
||||||
log.Printf("New certificates don't cover required domains")
|
log.Printf("New certificates don't cover required domains")
|
||||||
|
|
||||||
|
if !isACMEConfigComplete() {
|
||||||
|
log.Printf("Cannot switch to CertMagic: ACME configuration is incomplete (CF_API_TOKEN is required)")
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Printf("Switching to CertMagic for automatic certificate management")
|
||||||
if err := tm.initCertMagic(); err != nil {
|
if err := tm.initCertMagic(); err != nil {
|
||||||
log.Printf("Failed to initialize CertMagic: %v", err)
|
log.Printf("Failed to initialize CertMagic: %v", err)
|
||||||
continue
|
continue
|
||||||
@@ -224,12 +241,16 @@ func (tm *tlsManager) initCertMagic() error {
|
|||||||
return fmt.Errorf("failed to create cert storage directory: %w", err)
|
return fmt.Errorf("failed to create cert storage directory: %w", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
if tm.config.CFAPIToken() == "" {
|
acmeEmail := config.Getenv("ACME_EMAIL", "admin@"+tm.domain)
|
||||||
|
cfAPIToken := config.Getenv("CF_API_TOKEN", "")
|
||||||
|
acmeStaging := config.Getenv("ACME_STAGING", "false") == "true"
|
||||||
|
|
||||||
|
if cfAPIToken == "" {
|
||||||
return fmt.Errorf("CF_API_TOKEN environment variable is required for automatic certificate generation")
|
return fmt.Errorf("CF_API_TOKEN environment variable is required for automatic certificate generation")
|
||||||
}
|
}
|
||||||
|
|
||||||
cfProvider := &cloudflare.Provider{
|
cfProvider := &cloudflare.Provider{
|
||||||
APIToken: tm.config.CFAPIToken(),
|
APIToken: cfAPIToken,
|
||||||
}
|
}
|
||||||
|
|
||||||
storage := &certmagic.FileStorage{Path: tm.storagePath}
|
storage := &certmagic.FileStorage{Path: tm.storagePath}
|
||||||
@@ -245,7 +266,7 @@ func (tm *tlsManager) initCertMagic() error {
|
|||||||
})
|
})
|
||||||
|
|
||||||
acmeIssuer := certmagic.NewACMEIssuer(magic, certmagic.ACMEIssuer{
|
acmeIssuer := certmagic.NewACMEIssuer(magic, certmagic.ACMEIssuer{
|
||||||
Email: tm.config.ACMEEmail(),
|
Email: acmeEmail,
|
||||||
Agreed: true,
|
Agreed: true,
|
||||||
DNS01Solver: &certmagic.DNS01Solver{
|
DNS01Solver: &certmagic.DNS01Solver{
|
||||||
DNSManager: certmagic.DNSManager{
|
DNSManager: certmagic.DNSManager{
|
||||||
@@ -254,7 +275,7 @@ func (tm *tlsManager) initCertMagic() error {
|
|||||||
},
|
},
|
||||||
})
|
})
|
||||||
|
|
||||||
if tm.config.ACMEStaging() {
|
if acmeStaging {
|
||||||
acmeIssuer.CA = certmagic.LetsEncryptStagingCA
|
acmeIssuer.CA = certmagic.LetsEncryptStagingCA
|
||||||
log.Printf("Using Let's Encrypt staging server")
|
log.Printf("Using Let's Encrypt staging server")
|
||||||
} else {
|
} else {
|
||||||
@@ -265,7 +286,7 @@ func (tm *tlsManager) initCertMagic() error {
|
|||||||
magic.Issuers = []certmagic.Issuer{acmeIssuer}
|
magic.Issuers = []certmagic.Issuer{acmeIssuer}
|
||||||
tm.magic = magic
|
tm.magic = magic
|
||||||
|
|
||||||
domains := []string{tm.config.Domain(), "*." + tm.config.Domain()}
|
domains := []string{tm.domain, "*." + tm.domain}
|
||||||
log.Printf("Requesting certificates for: %v", domains)
|
log.Printf("Requesting certificates for: %v", domains)
|
||||||
|
|
||||||
ctx := context.Background()
|
ctx := context.Background()
|
||||||
@@ -280,16 +301,22 @@ func (tm *tlsManager) initCertMagic() error {
|
|||||||
func (tm *tlsManager) getTLSConfig() *tls.Config {
|
func (tm *tlsManager) getTLSConfig() *tls.Config {
|
||||||
return &tls.Config{
|
return &tls.Config{
|
||||||
GetCertificate: tm.getCertificate,
|
GetCertificate: tm.getCertificate,
|
||||||
|
|
||||||
MinVersion: tls.VersionTLS13,
|
MinVersion: tls.VersionTLS13,
|
||||||
MaxVersion: tls.VersionTLS13,
|
MaxVersion: tls.VersionTLS13,
|
||||||
|
|
||||||
|
SessionTicketsDisabled: false,
|
||||||
|
|
||||||
|
CipherSuites: []uint16{
|
||||||
|
tls.TLS_AES_128_GCM_SHA256,
|
||||||
|
tls.TLS_CHACHA20_POLY1305_SHA256,
|
||||||
|
},
|
||||||
|
|
||||||
CurvePreferences: []tls.CurveID{
|
CurvePreferences: []tls.CurveID{
|
||||||
tls.X25519,
|
tls.X25519,
|
||||||
},
|
},
|
||||||
|
|
||||||
SessionTicketsDisabled: false,
|
|
||||||
ClientAuth: tls.NoClientCert,
|
ClientAuth: tls.NoClientCert,
|
||||||
|
NextProtos: nil,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
+121
-96
@@ -4,7 +4,6 @@ import (
|
|||||||
"bytes"
|
"bytes"
|
||||||
"encoding/binary"
|
"encoding/binary"
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
|
||||||
"io"
|
"io"
|
||||||
"log"
|
"log"
|
||||||
"net"
|
"net"
|
||||||
@@ -18,51 +17,81 @@ import (
|
|||||||
"golang.org/x/crypto/ssh"
|
"golang.org/x/crypto/ssh"
|
||||||
)
|
)
|
||||||
|
|
||||||
type Forwarder interface {
|
var bufferPool = sync.Pool{
|
||||||
SetType(tunnelType types.TunnelType)
|
|
||||||
SetForwardedPort(port uint16)
|
|
||||||
SetListener(listener net.Listener)
|
|
||||||
Listener() net.Listener
|
|
||||||
TunnelType() types.TunnelType
|
|
||||||
ForwardedPort() uint16
|
|
||||||
HandleConnection(dst io.ReadWriter, src ssh.Channel)
|
|
||||||
CreateForwardedTCPIPPayload(origin net.Addr) []byte
|
|
||||||
OpenForwardedChannel(payload []byte) (ssh.Channel, <-chan *ssh.Request, error)
|
|
||||||
WriteBadGatewayResponse(dst io.Writer)
|
|
||||||
Close() error
|
|
||||||
}
|
|
||||||
type forwarder struct {
|
|
||||||
listener net.Listener
|
|
||||||
tunnelType types.TunnelType
|
|
||||||
forwardedPort uint16
|
|
||||||
slug slug.Slug
|
|
||||||
conn ssh.Conn
|
|
||||||
bufferPool sync.Pool
|
|
||||||
}
|
|
||||||
|
|
||||||
func New(config config.Config, slug slug.Slug, conn ssh.Conn) Forwarder {
|
|
||||||
return &forwarder{
|
|
||||||
listener: nil,
|
|
||||||
tunnelType: types.TunnelTypeUNKNOWN,
|
|
||||||
forwardedPort: 0,
|
|
||||||
slug: slug,
|
|
||||||
conn: conn,
|
|
||||||
bufferPool: sync.Pool{
|
|
||||||
New: func() interface{} {
|
New: func() interface{} {
|
||||||
bufSize := config.BufferSize()
|
bufSize := config.GetBufferSize()
|
||||||
return make([]byte, bufSize)
|
return make([]byte, bufSize)
|
||||||
},
|
},
|
||||||
},
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (f *forwarder) copyWithBuffer(dst io.Writer, src io.Reader) (written int64, err error) {
|
func copyWithBuffer(dst io.Writer, src io.Reader) (written int64, err error) {
|
||||||
buf := f.bufferPool.Get().([]byte)
|
buf := bufferPool.Get().([]byte)
|
||||||
defer f.bufferPool.Put(buf)
|
defer bufferPool.Put(buf)
|
||||||
return io.CopyBuffer(dst, src, buf)
|
return io.CopyBuffer(dst, src, buf)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (f *forwarder) OpenForwardedChannel(payload []byte) (ssh.Channel, <-chan *ssh.Request, error) {
|
type Forwarder struct {
|
||||||
|
listener net.Listener
|
||||||
|
tunnelType types.TunnelType
|
||||||
|
forwardedPort uint16
|
||||||
|
slugManager slug.Manager
|
||||||
|
lifecycle Lifecycle
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewForwarder(slugManager slug.Manager) *Forwarder {
|
||||||
|
return &Forwarder{
|
||||||
|
listener: nil,
|
||||||
|
tunnelType: "",
|
||||||
|
forwardedPort: 0,
|
||||||
|
slugManager: slugManager,
|
||||||
|
lifecycle: nil,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
type Lifecycle interface {
|
||||||
|
GetConnection() ssh.Conn
|
||||||
|
}
|
||||||
|
|
||||||
|
type ForwardingController interface {
|
||||||
|
AcceptTCPConnections()
|
||||||
|
SetType(tunnelType types.TunnelType)
|
||||||
|
GetTunnelType() types.TunnelType
|
||||||
|
GetForwardedPort() uint16
|
||||||
|
SetForwardedPort(port uint16)
|
||||||
|
SetListener(listener net.Listener)
|
||||||
|
GetListener() net.Listener
|
||||||
|
Close() error
|
||||||
|
HandleConnection(dst io.ReadWriter, src ssh.Channel, remoteAddr net.Addr)
|
||||||
|
SetLifecycle(lifecycle Lifecycle)
|
||||||
|
CreateForwardedTCPIPPayload(origin net.Addr) []byte
|
||||||
|
WriteBadGatewayResponse(dst io.Writer)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *Forwarder) SetLifecycle(lifecycle Lifecycle) {
|
||||||
|
f.lifecycle = lifecycle
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *Forwarder) AcceptTCPConnections() {
|
||||||
|
for {
|
||||||
|
conn, err := f.GetListener().Accept()
|
||||||
|
if err != nil {
|
||||||
|
if errors.Is(err, net.ErrClosed) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
log.Printf("Error accepting connection: %v", err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := conn.SetDeadline(time.Now().Add(5 * time.Second)); err != nil {
|
||||||
|
log.Printf("Failed to set connection deadline: %v", err)
|
||||||
|
if closeErr := conn.Close(); closeErr != nil {
|
||||||
|
log.Printf("Failed to close connection: %v", closeErr)
|
||||||
|
}
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
payload := f.CreateForwardedTCPIPPayload(conn.RemoteAddr())
|
||||||
|
|
||||||
type channelResult struct {
|
type channelResult struct {
|
||||||
channel ssh.Channel
|
channel ssh.Channel
|
||||||
reqs <-chan *ssh.Request
|
reqs <-chan *ssh.Request
|
||||||
@@ -71,109 +100,105 @@ func (f *forwarder) OpenForwardedChannel(payload []byte) (ssh.Channel, <-chan *s
|
|||||||
resultChan := make(chan channelResult, 1)
|
resultChan := make(chan channelResult, 1)
|
||||||
|
|
||||||
go func() {
|
go func() {
|
||||||
channel, reqs, err := f.conn.OpenChannel("forwarded-tcpip", payload)
|
channel, reqs, err := f.lifecycle.GetConnection().OpenChannel("forwarded-tcpip", payload)
|
||||||
select {
|
resultChan <- channelResult{channel, reqs, err}
|
||||||
case resultChan <- channelResult{channel, reqs, err}:
|
|
||||||
default:
|
|
||||||
if channel != nil {
|
|
||||||
err = channel.Close()
|
|
||||||
if err != nil {
|
|
||||||
log.Printf("Failed to close unused channel: %v", err)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
go ssh.DiscardRequests(reqs)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}()
|
}()
|
||||||
|
|
||||||
select {
|
select {
|
||||||
case result := <-resultChan:
|
case result := <-resultChan:
|
||||||
return result.channel, result.reqs, result.err
|
if result.err != nil {
|
||||||
|
log.Printf("Failed to open forwarded-tcpip channel: %v", result.err)
|
||||||
|
if closeErr := conn.Close(); closeErr != nil {
|
||||||
|
log.Printf("Failed to close connection: %v", closeErr)
|
||||||
|
}
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := conn.SetDeadline(time.Time{}); err != nil {
|
||||||
|
log.Printf("Failed to clear connection deadline: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
go ssh.DiscardRequests(result.reqs)
|
||||||
|
go f.HandleConnection(conn, result.channel, conn.RemoteAddr())
|
||||||
|
|
||||||
case <-time.After(5 * time.Second):
|
case <-time.After(5 * time.Second):
|
||||||
return nil, nil, errors.New("timeout opening forwarded-tcpip channel")
|
log.Printf("Timeout opening forwarded-tcpip channel")
|
||||||
|
if closeErr := conn.Close(); closeErr != nil {
|
||||||
|
log.Printf("Failed to close connection: %v", closeErr)
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func closeWriter(w io.Writer) error {
|
func (f *Forwarder) HandleConnection(dst io.ReadWriter, src ssh.Channel, remoteAddr net.Addr) {
|
||||||
if cw, ok := w.(interface{ CloseWrite() error }); ok {
|
|
||||||
return cw.CloseWrite()
|
|
||||||
}
|
|
||||||
if closer, ok := w.(io.Closer); ok {
|
|
||||||
return closer.Close()
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (f *forwarder) copyAndClose(dst io.Writer, src io.Reader, direction string) error {
|
|
||||||
var errs []error
|
|
||||||
_, err := f.copyWithBuffer(dst, src)
|
|
||||||
if err != nil && !errors.Is(err, io.EOF) && !errors.Is(err, net.ErrClosed) {
|
|
||||||
errs = append(errs, fmt.Errorf("copy error (%s): %w", direction, err))
|
|
||||||
}
|
|
||||||
|
|
||||||
if err = closeWriter(dst); err != nil && !errors.Is(err, io.EOF) {
|
|
||||||
errs = append(errs, fmt.Errorf("close stream error (%s): %w", direction, err))
|
|
||||||
}
|
|
||||||
return errors.Join(errs...)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (f *forwarder) HandleConnection(dst io.ReadWriter, src ssh.Channel) {
|
|
||||||
defer func() {
|
defer func() {
|
||||||
_, err := io.Copy(io.Discard, src)
|
_, err := io.Copy(io.Discard, src)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Printf("Failed to discard connection: %v", err)
|
log.Printf("Failed to discard connection: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
err = src.Close()
|
||||||
|
if err != nil && !errors.Is(err, io.EOF) {
|
||||||
|
log.Printf("Error closing source channel: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if closer, ok := dst.(io.Closer); ok {
|
||||||
|
err = closer.Close()
|
||||||
|
if err != nil && !errors.Is(err, io.EOF) {
|
||||||
|
log.Printf("Error closing destination connection: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
}()
|
}()
|
||||||
|
|
||||||
|
log.Printf("Handling new forwarded connection from %s", remoteAddr)
|
||||||
|
|
||||||
var wg sync.WaitGroup
|
var wg sync.WaitGroup
|
||||||
wg.Add(2)
|
wg.Add(2)
|
||||||
|
|
||||||
go func() {
|
go func() {
|
||||||
defer wg.Done()
|
defer wg.Done()
|
||||||
err := f.copyAndClose(dst, src, "src to dst")
|
_, err := copyWithBuffer(dst, src)
|
||||||
if err != nil {
|
if err != nil && !errors.Is(err, io.EOF) && !errors.Is(err, net.ErrClosed) {
|
||||||
log.Println("Error during copy: ", err)
|
log.Printf("Error copying src→dst: %v", err)
|
||||||
return
|
|
||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
|
|
||||||
go func() {
|
go func() {
|
||||||
defer wg.Done()
|
defer wg.Done()
|
||||||
err := f.copyAndClose(src, dst, "dst to src")
|
_, err := copyWithBuffer(src, dst)
|
||||||
if err != nil {
|
if err != nil && !errors.Is(err, io.EOF) && !errors.Is(err, net.ErrClosed) {
|
||||||
log.Println("Error during copy: ", err)
|
log.Printf("Error copying dst→src: %v", err)
|
||||||
return
|
|
||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
|
|
||||||
wg.Wait()
|
wg.Wait()
|
||||||
}
|
}
|
||||||
|
|
||||||
func (f *forwarder) SetType(tunnelType types.TunnelType) {
|
func (f *Forwarder) SetType(tunnelType types.TunnelType) {
|
||||||
f.tunnelType = tunnelType
|
f.tunnelType = tunnelType
|
||||||
}
|
}
|
||||||
|
|
||||||
func (f *forwarder) TunnelType() types.TunnelType {
|
func (f *Forwarder) GetTunnelType() types.TunnelType {
|
||||||
return f.tunnelType
|
return f.tunnelType
|
||||||
}
|
}
|
||||||
|
|
||||||
func (f *forwarder) ForwardedPort() uint16 {
|
func (f *Forwarder) GetForwardedPort() uint16 {
|
||||||
return f.forwardedPort
|
return f.forwardedPort
|
||||||
}
|
}
|
||||||
|
|
||||||
func (f *forwarder) SetForwardedPort(port uint16) {
|
func (f *Forwarder) SetForwardedPort(port uint16) {
|
||||||
f.forwardedPort = port
|
f.forwardedPort = port
|
||||||
}
|
}
|
||||||
|
|
||||||
func (f *forwarder) SetListener(listener net.Listener) {
|
func (f *Forwarder) SetListener(listener net.Listener) {
|
||||||
f.listener = listener
|
f.listener = listener
|
||||||
}
|
}
|
||||||
|
|
||||||
func (f *forwarder) Listener() net.Listener {
|
func (f *Forwarder) GetListener() net.Listener {
|
||||||
return f.listener
|
return f.listener
|
||||||
}
|
}
|
||||||
|
|
||||||
func (f *forwarder) WriteBadGatewayResponse(dst io.Writer) {
|
func (f *Forwarder) WriteBadGatewayResponse(dst io.Writer) {
|
||||||
_, err := dst.Write(types.BadGatewayResponse)
|
_, err := dst.Write(types.BadGatewayResponse)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Printf("failed to write Bad Gateway response: %v", err)
|
log.Printf("failed to write Bad Gateway response: %v", err)
|
||||||
@@ -181,20 +206,20 @@ func (f *forwarder) WriteBadGatewayResponse(dst io.Writer) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (f *forwarder) Close() error {
|
func (f *Forwarder) Close() error {
|
||||||
if f.Listener() != nil {
|
if f.GetListener() != nil {
|
||||||
return f.listener.Close()
|
return f.listener.Close()
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (f *forwarder) CreateForwardedTCPIPPayload(origin net.Addr) []byte {
|
func (f *Forwarder) CreateForwardedTCPIPPayload(origin net.Addr) []byte {
|
||||||
var buf bytes.Buffer
|
var buf bytes.Buffer
|
||||||
|
|
||||||
host, originPort := parseAddr(origin.String())
|
host, originPort := parseAddr(origin.String())
|
||||||
|
|
||||||
writeSSHString(&buf, "localhost")
|
writeSSHString(&buf, "localhost")
|
||||||
err := binary.Write(&buf, binary.BigEndian, uint32(f.ForwardedPort()))
|
err := binary.Write(&buf, binary.BigEndian, uint32(f.GetForwardedPort()))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Printf("Failed to write string to buffer: %v", err)
|
log.Printf("Failed to write string to buffer: %v", err)
|
||||||
return nil
|
return nil
|
||||||
|
|||||||
@@ -0,0 +1,310 @@
|
|||||||
|
package session
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"encoding/binary"
|
||||||
|
"fmt"
|
||||||
|
"log"
|
||||||
|
"net"
|
||||||
|
portUtil "tunnel_pls/internal/port"
|
||||||
|
"tunnel_pls/internal/random"
|
||||||
|
"tunnel_pls/types"
|
||||||
|
|
||||||
|
"golang.org/x/crypto/ssh"
|
||||||
|
)
|
||||||
|
|
||||||
|
var blockedReservedPorts = []uint16{1080, 1433, 1521, 1900, 2049, 3306, 3389, 5432, 5900, 6379, 8080, 8443, 9000, 9200, 27017}
|
||||||
|
|
||||||
|
func (s *SSHSession) HandleGlobalRequest(GlobalRequest <-chan *ssh.Request) {
|
||||||
|
for req := range GlobalRequest {
|
||||||
|
switch req.Type {
|
||||||
|
case "shell", "pty-req":
|
||||||
|
err := req.Reply(true, nil)
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to reply to request:", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
case "window-change":
|
||||||
|
p := req.Payload
|
||||||
|
if len(p) < 16 {
|
||||||
|
log.Println("invalid window-change payload")
|
||||||
|
err := req.Reply(false, nil)
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to reply to request:", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
cols := binary.BigEndian.Uint32(p[0:4])
|
||||||
|
rows := binary.BigEndian.Uint32(p[4:8])
|
||||||
|
|
||||||
|
s.interaction.SetWH(int(cols), int(rows))
|
||||||
|
|
||||||
|
err := req.Reply(true, nil)
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to reply to request:", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
default:
|
||||||
|
log.Println("Unknown request type:", req.Type)
|
||||||
|
err := req.Reply(false, nil)
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to reply to request:", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *SSHSession) HandleTCPIPForward(req *ssh.Request) {
|
||||||
|
log.Println("Port forwarding request detected")
|
||||||
|
|
||||||
|
reader := bytes.NewReader(req.Payload)
|
||||||
|
|
||||||
|
addr, err := readSSHString(reader)
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to read address from payload:", err)
|
||||||
|
err := req.Reply(false, nil)
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to reply to request:", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
err = s.lifecycle.Close()
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("failed to close session: %v", err)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
var rawPortToBind uint32
|
||||||
|
if err := binary.Read(reader, binary.BigEndian, &rawPortToBind); err != nil {
|
||||||
|
log.Println("Failed to read port from payload:", err)
|
||||||
|
err := req.Reply(false, nil)
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to reply to request:", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
err = s.lifecycle.Close()
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("failed to close session: %v", err)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if rawPortToBind > 65535 {
|
||||||
|
log.Printf("Port %d is larger than allowed port of 65535", rawPortToBind)
|
||||||
|
err := req.Reply(false, nil)
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to reply to request:", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
err = s.lifecycle.Close()
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("failed to close session: %v", err)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
portToBind := uint16(rawPortToBind)
|
||||||
|
if isBlockedPort(portToBind) {
|
||||||
|
log.Printf("Port %d is blocked or restricted", portToBind)
|
||||||
|
err := req.Reply(false, nil)
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to reply to request:", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
err = s.lifecycle.Close()
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("failed to close session: %v", err)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if portToBind == 80 || portToBind == 443 {
|
||||||
|
s.HandleHTTPForward(req, portToBind)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if portToBind == 0 {
|
||||||
|
unassign, success := portUtil.Default.GetUnassignedPort()
|
||||||
|
portToBind = unassign
|
||||||
|
if !success {
|
||||||
|
log.Println("No available port")
|
||||||
|
err := req.Reply(false, nil)
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to reply to request:", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
err = s.lifecycle.Close()
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("failed to close session: %v", err)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
} else if isUse, isExist := portUtil.Default.GetPortStatus(portToBind); isExist && isUse {
|
||||||
|
log.Printf("Port %d is already in use or restricted", portToBind)
|
||||||
|
err := req.Reply(false, nil)
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to reply to request:", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
err = s.lifecycle.Close()
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("failed to close session: %v", err)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
err = portUtil.Default.SetPortStatus(portToBind, true)
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to set port status:", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
s.HandleTCPForward(req, addr, portToBind)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *SSHSession) HandleHTTPForward(req *ssh.Request, portToBind uint16) {
|
||||||
|
slug := random.GenerateRandomString(20)
|
||||||
|
key := types.SessionKey{Id: slug, Type: types.HTTP}
|
||||||
|
if !s.registry.Register(key, s) {
|
||||||
|
log.Printf("Failed to register client with slug: %s", slug)
|
||||||
|
err := req.Reply(false, nil)
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to reply to request:", err)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
buf := new(bytes.Buffer)
|
||||||
|
err := binary.Write(buf, binary.BigEndian, uint32(portToBind))
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to write port to buffer:", err)
|
||||||
|
s.registry.Remove(key)
|
||||||
|
err = req.Reply(false, nil)
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to reply to request:", err)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
log.Printf("HTTP forwarding approved on port: %d", portToBind)
|
||||||
|
|
||||||
|
err = req.Reply(true, buf.Bytes())
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to reply to request:", err)
|
||||||
|
s.registry.Remove(key)
|
||||||
|
err = req.Reply(false, nil)
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to reply to request:", err)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
s.forwarder.SetType(types.HTTP)
|
||||||
|
s.forwarder.SetForwardedPort(portToBind)
|
||||||
|
s.slugManager.Set(slug)
|
||||||
|
s.lifecycle.SetStatus(types.RUNNING)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *SSHSession) HandleTCPForward(req *ssh.Request, addr string, portToBind uint16) {
|
||||||
|
log.Printf("Requested forwarding on %s:%d", addr, portToBind)
|
||||||
|
listener, err := net.Listen("tcp", fmt.Sprintf("0.0.0.0:%d", portToBind))
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("Port %d is already in use or restricted", portToBind)
|
||||||
|
if setErr := portUtil.Default.SetPortStatus(portToBind, false); setErr != nil {
|
||||||
|
log.Printf("Failed to reset port status: %v", setErr)
|
||||||
|
}
|
||||||
|
err = req.Reply(false, nil)
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to reply to request:", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
err = s.lifecycle.Close()
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("failed to close session: %v", err)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
key := types.SessionKey{Id: fmt.Sprintf("%d", portToBind), Type: types.TCP}
|
||||||
|
|
||||||
|
if !s.registry.Register(key, s) {
|
||||||
|
log.Printf("Failed to register TCP client with id: %s", key.Id)
|
||||||
|
if setErr := portUtil.Default.SetPortStatus(portToBind, false); setErr != nil {
|
||||||
|
log.Printf("Failed to reset port status: %v", setErr)
|
||||||
|
}
|
||||||
|
if closeErr := listener.Close(); closeErr != nil {
|
||||||
|
log.Printf("Failed to close listener: %s", closeErr)
|
||||||
|
}
|
||||||
|
err = req.Reply(false, nil)
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to reply to request:", err)
|
||||||
|
}
|
||||||
|
_ = s.lifecycle.Close()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
buf := new(bytes.Buffer)
|
||||||
|
err = binary.Write(buf, binary.BigEndian, uint32(portToBind))
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to write port to buffer:", err)
|
||||||
|
s.registry.Remove(key)
|
||||||
|
if setErr := portUtil.Default.SetPortStatus(portToBind, false); setErr != nil {
|
||||||
|
log.Printf("Failed to reset port status: %v", setErr)
|
||||||
|
}
|
||||||
|
err = listener.Close()
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("Failed to close listener: %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Printf("TCP forwarding approved on port: %d", portToBind)
|
||||||
|
err = req.Reply(true, buf.Bytes())
|
||||||
|
if err != nil {
|
||||||
|
log.Println("Failed to reply to request:", err)
|
||||||
|
s.registry.Remove(key)
|
||||||
|
if setErr := portUtil.Default.SetPortStatus(portToBind, false); setErr != nil {
|
||||||
|
log.Printf("Failed to reset port status: %v", setErr)
|
||||||
|
}
|
||||||
|
err = listener.Close()
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("Failed to close listener: %s", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
s.forwarder.SetType(types.TCP)
|
||||||
|
s.forwarder.SetListener(listener)
|
||||||
|
s.forwarder.SetForwardedPort(portToBind)
|
||||||
|
s.slugManager.Set(key.Id)
|
||||||
|
s.lifecycle.SetStatus(types.RUNNING)
|
||||||
|
go s.forwarder.AcceptTCPConnections()
|
||||||
|
}
|
||||||
|
|
||||||
|
func readSSHString(reader *bytes.Reader) (string, error) {
|
||||||
|
var length uint32
|
||||||
|
if err := binary.Read(reader, binary.BigEndian, &length); err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
strBytes := make([]byte, length)
|
||||||
|
if _, err := reader.Read(strBytes); err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
return string(strBytes), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func isBlockedPort(port uint16) bool {
|
||||||
|
if port == 80 || port == 443 {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if port < 1024 && port != 0 {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
for _, p := range blockedReservedPorts {
|
||||||
|
if p == port {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
@@ -1,83 +0,0 @@
|
|||||||
package interaction
|
|
||||||
|
|
||||||
import (
|
|
||||||
"strings"
|
|
||||||
|
|
||||||
"github.com/charmbracelet/bubbles/textinput"
|
|
||||||
tea "github.com/charmbracelet/bubbletea"
|
|
||||||
"github.com/charmbracelet/lipgloss"
|
|
||||||
)
|
|
||||||
|
|
||||||
func (m *model) comingSoonUpdate(msg tea.KeyMsg) (tea.Model, tea.Cmd) {
|
|
||||||
m.showingComingSoon = false
|
|
||||||
return m, tea.Batch(tea.ClearScreen, textinput.Blink)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (m *model) comingSoonView() string {
|
|
||||||
isCompact := shouldUseCompactLayout(m.width, 60)
|
|
||||||
|
|
||||||
var boxPadding int
|
|
||||||
var boxMargin int
|
|
||||||
if isCompact {
|
|
||||||
boxPadding = 1
|
|
||||||
boxMargin = 1
|
|
||||||
} else {
|
|
||||||
boxPadding = 3
|
|
||||||
boxMargin = 2
|
|
||||||
}
|
|
||||||
|
|
||||||
titleStyle := lipgloss.NewStyle().
|
|
||||||
Bold(true).
|
|
||||||
Foreground(lipgloss.Color("#7D56F4")).
|
|
||||||
PaddingTop(1).
|
|
||||||
PaddingBottom(1)
|
|
||||||
|
|
||||||
messageBoxWidth := getResponsiveWidth(m.width, 10, 30, 60)
|
|
||||||
messageBoxStyle := lipgloss.NewStyle().
|
|
||||||
Foreground(lipgloss.Color("#FAFAFA")).
|
|
||||||
Background(lipgloss.Color("#1A1A2E")).
|
|
||||||
Bold(true).
|
|
||||||
Border(lipgloss.RoundedBorder()).
|
|
||||||
BorderForeground(lipgloss.Color("#7D56F4")).
|
|
||||||
Padding(1, boxPadding).
|
|
||||||
MarginTop(boxMargin).
|
|
||||||
MarginBottom(boxMargin).
|
|
||||||
Width(messageBoxWidth).
|
|
||||||
Align(lipgloss.Center)
|
|
||||||
|
|
||||||
helpStyle := lipgloss.NewStyle().
|
|
||||||
Foreground(lipgloss.Color("#666666")).
|
|
||||||
Italic(true).
|
|
||||||
MarginTop(1)
|
|
||||||
|
|
||||||
var b strings.Builder
|
|
||||||
b.WriteString("\n\n")
|
|
||||||
|
|
||||||
var title string
|
|
||||||
if shouldUseCompactLayout(m.width, 40) {
|
|
||||||
title = "Coming Soon"
|
|
||||||
} else {
|
|
||||||
title = "⏳ Coming Soon"
|
|
||||||
}
|
|
||||||
b.WriteString(titleStyle.Render(title))
|
|
||||||
b.WriteString("\n\n")
|
|
||||||
|
|
||||||
var message string
|
|
||||||
if shouldUseCompactLayout(m.width, 50) {
|
|
||||||
message = "Coming soon!\nStay tuned."
|
|
||||||
} else {
|
|
||||||
message = "🚀 This feature is coming very soon!\n Stay tuned for updates."
|
|
||||||
}
|
|
||||||
b.WriteString(messageBoxStyle.Render(message))
|
|
||||||
b.WriteString("\n\n")
|
|
||||||
|
|
||||||
var helpText string
|
|
||||||
if shouldUseCompactLayout(m.width, 60) {
|
|
||||||
helpText = "Press any key..."
|
|
||||||
} else {
|
|
||||||
helpText = "This message will disappear in 5 seconds or press any key..."
|
|
||||||
}
|
|
||||||
b.WriteString(helpStyle.Render(helpText))
|
|
||||||
|
|
||||||
return b.String()
|
|
||||||
}
|
|
||||||
@@ -1,83 +0,0 @@
|
|||||||
package interaction
|
|
||||||
|
|
||||||
import (
|
|
||||||
"strings"
|
|
||||||
"time"
|
|
||||||
|
|
||||||
"github.com/charmbracelet/bubbles/key"
|
|
||||||
"github.com/charmbracelet/bubbles/textinput"
|
|
||||||
tea "github.com/charmbracelet/bubbletea"
|
|
||||||
"github.com/charmbracelet/lipgloss"
|
|
||||||
)
|
|
||||||
|
|
||||||
func (m *model) commandsUpdate(msg tea.KeyMsg) (tea.Model, tea.Cmd) {
|
|
||||||
var cmd tea.Cmd
|
|
||||||
|
|
||||||
switch {
|
|
||||||
case key.Matches(msg, m.keymap.quit):
|
|
||||||
m.showingCommands = false
|
|
||||||
return m, tea.Batch(tea.ClearScreen, textinput.Blink)
|
|
||||||
case msg.String() == "enter":
|
|
||||||
selectedItem := m.commandList.SelectedItem()
|
|
||||||
if selectedItem != nil {
|
|
||||||
item := selectedItem.(commandItem)
|
|
||||||
if item.name == "slug" {
|
|
||||||
m.showingCommands = false
|
|
||||||
m.editingSlug = true
|
|
||||||
m.slugInput.SetValue(m.interaction.slug.String())
|
|
||||||
m.slugInput.Focus()
|
|
||||||
return m, tea.Batch(tea.ClearScreen, textinput.Blink)
|
|
||||||
} else if item.name == "tunnel-type" {
|
|
||||||
m.showingCommands = false
|
|
||||||
m.showingComingSoon = true
|
|
||||||
return m, tea.Batch(tickCmd(5*time.Second), tea.ClearScreen, textinput.Blink)
|
|
||||||
}
|
|
||||||
m.showingCommands = false
|
|
||||||
return m, nil
|
|
||||||
}
|
|
||||||
case msg.String() == "esc":
|
|
||||||
m.showingCommands = false
|
|
||||||
return m, tea.Batch(tea.ClearScreen, textinput.Blink)
|
|
||||||
}
|
|
||||||
m.commandList, cmd = m.commandList.Update(msg)
|
|
||||||
return m, cmd
|
|
||||||
}
|
|
||||||
|
|
||||||
func (m *model) commandsView() string {
|
|
||||||
isCompact := shouldUseCompactLayout(m.width, 60)
|
|
||||||
|
|
||||||
titleStyle := lipgloss.NewStyle().
|
|
||||||
Bold(true).
|
|
||||||
Foreground(lipgloss.Color("#7D56F4")).
|
|
||||||
PaddingTop(1).
|
|
||||||
PaddingBottom(1)
|
|
||||||
|
|
||||||
helpStyle := lipgloss.NewStyle().
|
|
||||||
Foreground(lipgloss.Color("#666666")).
|
|
||||||
Italic(true).
|
|
||||||
MarginTop(1)
|
|
||||||
|
|
||||||
var b strings.Builder
|
|
||||||
b.WriteString("\n")
|
|
||||||
|
|
||||||
var title string
|
|
||||||
if shouldUseCompactLayout(m.width, 40) {
|
|
||||||
title = "Commands"
|
|
||||||
} else {
|
|
||||||
title = "⚡ Commands"
|
|
||||||
}
|
|
||||||
b.WriteString(titleStyle.Render(title))
|
|
||||||
b.WriteString("\n\n")
|
|
||||||
b.WriteString(m.commandList.View())
|
|
||||||
b.WriteString("\n")
|
|
||||||
|
|
||||||
var helpText string
|
|
||||||
if isCompact {
|
|
||||||
helpText = "↑/↓ Nav • Enter Select • Esc Cancel"
|
|
||||||
} else {
|
|
||||||
helpText = "↑/↓ Navigate • Enter Select • Esc Cancel"
|
|
||||||
}
|
|
||||||
b.WriteString(helpStyle.Render(helpText))
|
|
||||||
|
|
||||||
return b.String()
|
|
||||||
}
|
|
||||||
@@ -1,186 +0,0 @@
|
|||||||
package interaction
|
|
||||||
|
|
||||||
import (
|
|
||||||
"fmt"
|
|
||||||
"strings"
|
|
||||||
|
|
||||||
"github.com/charmbracelet/bubbles/key"
|
|
||||||
"github.com/charmbracelet/bubbles/textinput"
|
|
||||||
tea "github.com/charmbracelet/bubbletea"
|
|
||||||
"github.com/charmbracelet/lipgloss"
|
|
||||||
)
|
|
||||||
|
|
||||||
func (m *model) dashboardUpdate(msg tea.KeyMsg) (tea.Model, tea.Cmd) {
|
|
||||||
switch {
|
|
||||||
case key.Matches(msg, m.keymap.quit):
|
|
||||||
m.quitting = true
|
|
||||||
return m, tea.Batch(tea.ClearScreen, textinput.Blink, tea.Quit)
|
|
||||||
case key.Matches(msg, m.keymap.command):
|
|
||||||
m.showingCommands = true
|
|
||||||
return m, tea.Batch(tea.ClearScreen, textinput.Blink)
|
|
||||||
}
|
|
||||||
return m, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (m *model) dashboardView() string {
|
|
||||||
titleStyle := lipgloss.NewStyle().
|
|
||||||
Bold(true).
|
|
||||||
Foreground(lipgloss.Color("#7D56F4")).
|
|
||||||
PaddingTop(1)
|
|
||||||
|
|
||||||
subtitleStyle := lipgloss.NewStyle().
|
|
||||||
Foreground(lipgloss.Color("#888888")).
|
|
||||||
Italic(true)
|
|
||||||
|
|
||||||
urlStyle := lipgloss.NewStyle().
|
|
||||||
Foreground(lipgloss.Color("#7D56F4")).
|
|
||||||
Underline(true).
|
|
||||||
Italic(true)
|
|
||||||
|
|
||||||
urlBoxStyle := lipgloss.NewStyle().
|
|
||||||
Foreground(lipgloss.Color("#04B575")).
|
|
||||||
Bold(true).
|
|
||||||
Italic(true)
|
|
||||||
|
|
||||||
keyHintStyle := lipgloss.NewStyle().
|
|
||||||
Foreground(lipgloss.Color("#7D56F4")).
|
|
||||||
Bold(true)
|
|
||||||
|
|
||||||
var b strings.Builder
|
|
||||||
|
|
||||||
isCompact := shouldUseCompactLayout(m.width, 85)
|
|
||||||
|
|
||||||
var asciiArtMargin int
|
|
||||||
if isCompact {
|
|
||||||
asciiArtMargin = 0
|
|
||||||
} else {
|
|
||||||
asciiArtMargin = 1
|
|
||||||
}
|
|
||||||
|
|
||||||
asciiArtStyle := lipgloss.NewStyle().
|
|
||||||
Bold(true).
|
|
||||||
Foreground(lipgloss.Color("#7D56F4")).
|
|
||||||
MarginBottom(asciiArtMargin)
|
|
||||||
|
|
||||||
var asciiArt string
|
|
||||||
if shouldUseCompactLayout(m.width, 50) {
|
|
||||||
asciiArt = "TUNNEL PLS"
|
|
||||||
} else if isCompact {
|
|
||||||
asciiArt = `
|
|
||||||
▀█▀ █ █ █▄ █ █▄ █ ██▀ █ ▄▀▀ █ ▄▀▀
|
|
||||||
█ ▀▄█ █ ▀█ █ ▀█ █▄▄ █▄▄ ▄█▀ █▄▄ ▄█▀`
|
|
||||||
} else {
|
|
||||||
asciiArt = `
|
|
||||||
████████╗██╗ ██╗███╗ ██╗███╗ ██╗███████╗██╗ ██████╗ ██╗ ███████╗
|
|
||||||
╚══██╔══╝██║ ██║████╗ ██║████╗ ██║██╔════╝██║ ██╔══██╗██║ ██╔════╝
|
|
||||||
██║ ██║ ██║██╔██╗ ██║██╔██╗ ██║█████╗ ██║ ██████╔╝██║ ███████╗
|
|
||||||
██║ ██║ ██║██║╚██╗██║██║╚██╗██║██╔══╝ ██║ ██╔═══╝ ██║ ╚════██║
|
|
||||||
██║ ╚██████╔╝██║ ╚████║██║ ╚████║███████╗███████╗ ██║ ███████╗███████║
|
|
||||||
╚═╝ ╚═════╝ ╚═╝ ╚═══╝╚═╝ ╚═══╝╚══════╝╚══════╝ ╚═╝ ╚══════╝╚══════╝`
|
|
||||||
}
|
|
||||||
|
|
||||||
b.WriteString(asciiArtStyle.Render(asciiArt))
|
|
||||||
b.WriteString("\n")
|
|
||||||
|
|
||||||
if !shouldUseCompactLayout(m.width, 60) {
|
|
||||||
b.WriteString(subtitleStyle.Render("Secure tunnel service by Bagas • "))
|
|
||||||
b.WriteString(urlStyle.Render("https://fossy.my.id"))
|
|
||||||
b.WriteString("\n\n")
|
|
||||||
} else {
|
|
||||||
b.WriteString("\n")
|
|
||||||
}
|
|
||||||
|
|
||||||
boxMaxWidth := getResponsiveWidth(m.width, 10, 40, 80)
|
|
||||||
var boxPadding int
|
|
||||||
var boxMargin int
|
|
||||||
if isCompact {
|
|
||||||
boxPadding = 1
|
|
||||||
boxMargin = 1
|
|
||||||
} else {
|
|
||||||
boxPadding = 2
|
|
||||||
boxMargin = 2
|
|
||||||
}
|
|
||||||
|
|
||||||
responsiveInfoBox := lipgloss.NewStyle().
|
|
||||||
Border(lipgloss.RoundedBorder()).
|
|
||||||
BorderForeground(lipgloss.Color("#7D56F4")).
|
|
||||||
Padding(1, boxPadding).
|
|
||||||
MarginTop(boxMargin).
|
|
||||||
MarginBottom(boxMargin).
|
|
||||||
Width(boxMaxWidth)
|
|
||||||
|
|
||||||
authenticatedUser := m.interaction.user
|
|
||||||
|
|
||||||
userInfoStyle := lipgloss.NewStyle().
|
|
||||||
Foreground(lipgloss.Color("#FAFAFA")).
|
|
||||||
Bold(true)
|
|
||||||
|
|
||||||
sectionHeaderStyle := lipgloss.NewStyle().
|
|
||||||
Foreground(lipgloss.Color("#888888")).
|
|
||||||
Bold(true)
|
|
||||||
|
|
||||||
addressStyle := lipgloss.NewStyle().
|
|
||||||
Foreground(lipgloss.Color("#FAFAFA"))
|
|
||||||
|
|
||||||
var infoContent string
|
|
||||||
if shouldUseCompactLayout(m.width, 70) {
|
|
||||||
infoContent = fmt.Sprintf("👤 %s\n\n%s\n%s",
|
|
||||||
userInfoStyle.Render(authenticatedUser),
|
|
||||||
sectionHeaderStyle.Render("🌐 FORWARDING ADDRESS:"),
|
|
||||||
addressStyle.Render(fmt.Sprintf(" %s", urlBoxStyle.Render(m.getTunnelURL()))))
|
|
||||||
} else {
|
|
||||||
infoContent = fmt.Sprintf("👤 Authenticated as: %s\n\n%s\n %s",
|
|
||||||
userInfoStyle.Render(authenticatedUser),
|
|
||||||
sectionHeaderStyle.Render("🌐 FORWARDING ADDRESS:"),
|
|
||||||
addressStyle.Render(urlBoxStyle.Render(m.getTunnelURL())))
|
|
||||||
}
|
|
||||||
|
|
||||||
b.WriteString(responsiveInfoBox.Render(infoContent))
|
|
||||||
b.WriteString("\n")
|
|
||||||
|
|
||||||
var quickActionsTitle string
|
|
||||||
if shouldUseCompactLayout(m.width, 50) {
|
|
||||||
quickActionsTitle = "Actions"
|
|
||||||
} else if isCompact {
|
|
||||||
quickActionsTitle = "Quick Actions"
|
|
||||||
} else {
|
|
||||||
quickActionsTitle = "✨ Quick Actions"
|
|
||||||
}
|
|
||||||
b.WriteString(titleStyle.Render(quickActionsTitle))
|
|
||||||
b.WriteString("\n")
|
|
||||||
|
|
||||||
var featureMargin int
|
|
||||||
if isCompact {
|
|
||||||
featureMargin = 1
|
|
||||||
} else {
|
|
||||||
featureMargin = 2
|
|
||||||
}
|
|
||||||
|
|
||||||
compactFeatureStyle := lipgloss.NewStyle().
|
|
||||||
Foreground(lipgloss.Color("#FAFAFA")).
|
|
||||||
MarginLeft(featureMargin)
|
|
||||||
|
|
||||||
var commandsText string
|
|
||||||
var quitText string
|
|
||||||
if shouldUseCompactLayout(m.width, 60) {
|
|
||||||
commandsText = fmt.Sprintf(" %s Commands", keyHintStyle.Render("[C]"))
|
|
||||||
quitText = fmt.Sprintf(" %s Quit", keyHintStyle.Render("[Q]"))
|
|
||||||
} else {
|
|
||||||
commandsText = fmt.Sprintf(" %s Open commands menu", keyHintStyle.Render("[C]"))
|
|
||||||
quitText = fmt.Sprintf(" %s Quit application", keyHintStyle.Render("[Q]"))
|
|
||||||
}
|
|
||||||
|
|
||||||
b.WriteString(compactFeatureStyle.Render(commandsText))
|
|
||||||
b.WriteString("\n")
|
|
||||||
b.WriteString(compactFeatureStyle.Render(quitText))
|
|
||||||
|
|
||||||
if !shouldUseCompactLayout(m.width, 70) {
|
|
||||||
b.WriteString("\n\n")
|
|
||||||
footerStyle := lipgloss.NewStyle().
|
|
||||||
Foreground(lipgloss.Color("#666666")).
|
|
||||||
Italic(true)
|
|
||||||
b.WriteString(footerStyle.Render("Press 'C' to customize your tunnel settings"))
|
|
||||||
}
|
|
||||||
|
|
||||||
return b.String()
|
|
||||||
}
|
|
||||||
@@ -2,8 +2,12 @@ package interaction
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"fmt"
|
||||||
"log"
|
"log"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
"tunnel_pls/internal/config"
|
"tunnel_pls/internal/config"
|
||||||
|
"tunnel_pls/internal/random"
|
||||||
"tunnel_pls/session/slug"
|
"tunnel_pls/session/slug"
|
||||||
"tunnel_pls/types"
|
"tunnel_pls/types"
|
||||||
|
|
||||||
@@ -17,57 +21,61 @@ import (
|
|||||||
"golang.org/x/crypto/ssh"
|
"golang.org/x/crypto/ssh"
|
||||||
)
|
)
|
||||||
|
|
||||||
type Interaction interface {
|
type Lifecycle interface {
|
||||||
Mode() types.InteractiveMode
|
Close() error
|
||||||
SetChannel(channel ssh.Channel)
|
GetUser() string
|
||||||
SetMode(m types.InteractiveMode)
|
|
||||||
SetWH(w, h int)
|
|
||||||
Start()
|
|
||||||
Redraw()
|
|
||||||
Send(message string) error
|
|
||||||
}
|
}
|
||||||
|
|
||||||
type SessionRegistry interface {
|
type SessionRegistry interface {
|
||||||
Update(user string, oldKey, newKey types.SessionKey) error
|
Update(user string, oldKey, newKey types.SessionKey) error
|
||||||
}
|
}
|
||||||
|
|
||||||
type Forwarder interface {
|
type Controller interface {
|
||||||
Close() error
|
SetChannel(channel ssh.Channel)
|
||||||
TunnelType() types.TunnelType
|
SetLifecycle(lifecycle Lifecycle)
|
||||||
ForwardedPort() uint16
|
Start()
|
||||||
|
SetWH(w, h int)
|
||||||
|
Redraw()
|
||||||
|
SetSessionRegistry(registry SessionRegistry)
|
||||||
|
SetMode(m types.Mode)
|
||||||
|
GetMode() types.Mode
|
||||||
|
Send(message string) error
|
||||||
}
|
}
|
||||||
|
|
||||||
type CloseFunc func() error
|
type Forwarder interface {
|
||||||
type interaction struct {
|
Close() error
|
||||||
config config.Config
|
GetTunnelType() types.TunnelType
|
||||||
|
GetForwardedPort() uint16
|
||||||
|
}
|
||||||
|
|
||||||
|
type Interaction struct {
|
||||||
channel ssh.Channel
|
channel ssh.Channel
|
||||||
slug slug.Slug
|
slugManager slug.Manager
|
||||||
forwarder Forwarder
|
forwarder Forwarder
|
||||||
closeFunc CloseFunc
|
lifecycle Lifecycle
|
||||||
user string
|
|
||||||
sessionRegistry SessionRegistry
|
sessionRegistry SessionRegistry
|
||||||
program *tea.Program
|
program *tea.Program
|
||||||
ctx context.Context
|
ctx context.Context
|
||||||
cancel context.CancelFunc
|
cancel context.CancelFunc
|
||||||
mode types.InteractiveMode
|
mode types.Mode
|
||||||
}
|
}
|
||||||
|
|
||||||
func (i *interaction) SetMode(m types.InteractiveMode) {
|
func (i *Interaction) SetMode(m types.Mode) {
|
||||||
i.mode = m
|
i.mode = m
|
||||||
}
|
}
|
||||||
|
|
||||||
func (i *interaction) Mode() types.InteractiveMode {
|
func (i *Interaction) GetMode() types.Mode {
|
||||||
return i.mode
|
return i.mode
|
||||||
}
|
}
|
||||||
|
|
||||||
func (i *interaction) Send(message string) error {
|
func (i *Interaction) Send(message string) error {
|
||||||
if i.channel != nil {
|
if i.channel != nil {
|
||||||
_, err := i.channel.Write([]byte(message))
|
_, err := i.channel.Write([]byte(message))
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
func (i *interaction) SetWH(w, h int) {
|
func (i *Interaction) SetWH(w, h int) {
|
||||||
if i.program != nil {
|
if i.program != nil {
|
||||||
i.program.Send(tea.WindowSizeMsg{
|
i.program.Send(tea.WindowSizeMsg{
|
||||||
Width: w,
|
Width: w,
|
||||||
@@ -76,27 +84,72 @@ func (i *interaction) SetWH(w, h int) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func New(config config.Config, slug slug.Slug, forwarder Forwarder, sessionRegistry SessionRegistry, user string, closeFunc CloseFunc) Interaction {
|
type commandItem struct {
|
||||||
|
name string
|
||||||
|
desc string
|
||||||
|
}
|
||||||
|
|
||||||
|
type model struct {
|
||||||
|
domain string
|
||||||
|
protocol string
|
||||||
|
tunnelType types.TunnelType
|
||||||
|
port uint16
|
||||||
|
keymap keymap
|
||||||
|
help help.Model
|
||||||
|
quitting bool
|
||||||
|
showingCommands bool
|
||||||
|
editingSlug bool
|
||||||
|
showingComingSoon bool
|
||||||
|
commandList list.Model
|
||||||
|
slugInput textinput.Model
|
||||||
|
slugError string
|
||||||
|
interaction *Interaction
|
||||||
|
width int
|
||||||
|
height int
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *model) getTunnelURL() string {
|
||||||
|
if m.tunnelType == types.HTTP {
|
||||||
|
return buildURL(m.protocol, m.interaction.slugManager.Get(), m.domain)
|
||||||
|
}
|
||||||
|
return fmt.Sprintf("tcp://%s:%d", m.domain, m.port)
|
||||||
|
}
|
||||||
|
|
||||||
|
type keymap struct {
|
||||||
|
quit key.Binding
|
||||||
|
command key.Binding
|
||||||
|
random key.Binding
|
||||||
|
}
|
||||||
|
|
||||||
|
type tickMsg time.Time
|
||||||
|
|
||||||
|
func NewInteraction(slugManager slug.Manager, forwarder Forwarder) *Interaction {
|
||||||
ctx, cancel := context.WithCancel(context.Background())
|
ctx, cancel := context.WithCancel(context.Background())
|
||||||
return &interaction{
|
return &Interaction{
|
||||||
config: config,
|
|
||||||
channel: nil,
|
channel: nil,
|
||||||
slug: slug,
|
slugManager: slugManager,
|
||||||
forwarder: forwarder,
|
forwarder: forwarder,
|
||||||
closeFunc: closeFunc,
|
lifecycle: nil,
|
||||||
user: user,
|
sessionRegistry: nil,
|
||||||
sessionRegistry: sessionRegistry,
|
|
||||||
program: nil,
|
program: nil,
|
||||||
ctx: ctx,
|
ctx: ctx,
|
||||||
cancel: cancel,
|
cancel: cancel,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (i *interaction) SetChannel(channel ssh.Channel) {
|
func (i *Interaction) SetSessionRegistry(registry SessionRegistry) {
|
||||||
|
i.sessionRegistry = registry
|
||||||
|
}
|
||||||
|
|
||||||
|
func (i *Interaction) SetLifecycle(lifecycle Lifecycle) {
|
||||||
|
i.lifecycle = lifecycle
|
||||||
|
}
|
||||||
|
|
||||||
|
func (i *Interaction) SetChannel(channel ssh.Channel) {
|
||||||
i.channel = channel
|
i.channel = channel
|
||||||
}
|
}
|
||||||
|
|
||||||
func (i *interaction) Stop() {
|
func (i *Interaction) Stop() {
|
||||||
if i.cancel != nil {
|
if i.cancel != nil {
|
||||||
i.cancel()
|
i.cancel()
|
||||||
}
|
}
|
||||||
@@ -106,7 +159,47 @@ func (i *interaction) Stop() {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func getResponsiveWidth(screenWidth, padding, minWidth, maxWidth int) int {
|
||||||
|
width := screenWidth - padding
|
||||||
|
if width > maxWidth {
|
||||||
|
width = maxWidth
|
||||||
|
}
|
||||||
|
if width < minWidth {
|
||||||
|
width = minWidth
|
||||||
|
}
|
||||||
|
return width
|
||||||
|
}
|
||||||
|
|
||||||
|
func shouldUseCompactLayout(width int, threshold int) bool {
|
||||||
|
return width < threshold
|
||||||
|
}
|
||||||
|
|
||||||
|
func truncateString(s string, maxLength int) string {
|
||||||
|
if len(s) <= maxLength {
|
||||||
|
return s
|
||||||
|
}
|
||||||
|
if maxLength < 4 {
|
||||||
|
return s[:maxLength]
|
||||||
|
}
|
||||||
|
return s[:maxLength-3] + "..."
|
||||||
|
}
|
||||||
|
|
||||||
|
func (i commandItem) FilterValue() string { return i.name }
|
||||||
|
func (i commandItem) Title() string { return i.name }
|
||||||
|
func (i commandItem) Description() string { return i.desc }
|
||||||
|
|
||||||
|
func tickCmd(d time.Duration) tea.Cmd {
|
||||||
|
return tea.Tick(d, func(t time.Time) tea.Msg {
|
||||||
|
return tickMsg(t)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *model) Init() tea.Cmd {
|
||||||
|
return tea.Batch(textinput.Blink, tea.WindowSize())
|
||||||
|
}
|
||||||
|
|
||||||
func (m *model) Update(msg tea.Msg) (tea.Model, tea.Cmd) {
|
func (m *model) Update(msg tea.Msg) (tea.Model, tea.Cmd) {
|
||||||
|
var cmd tea.Cmd
|
||||||
|
|
||||||
switch msg := msg.(type) {
|
switch msg := msg.(type) {
|
||||||
case tickMsg:
|
case tickMsg:
|
||||||
@@ -132,62 +225,562 @@ func (m *model) Update(msg tea.Msg) (tea.Model, tea.Cmd) {
|
|||||||
|
|
||||||
case tea.KeyMsg:
|
case tea.KeyMsg:
|
||||||
if m.showingComingSoon {
|
if m.showingComingSoon {
|
||||||
return m.comingSoonUpdate(msg)
|
m.showingComingSoon = false
|
||||||
|
return m, tea.Batch(tea.ClearScreen, textinput.Blink)
|
||||||
}
|
}
|
||||||
|
|
||||||
if m.editingSlug {
|
if m.editingSlug {
|
||||||
return m.slugUpdate(msg)
|
if m.tunnelType != types.HTTP {
|
||||||
|
m.editingSlug = false
|
||||||
|
m.slugError = ""
|
||||||
|
return m, tea.Batch(tea.ClearScreen, textinput.Blink)
|
||||||
|
}
|
||||||
|
switch msg.String() {
|
||||||
|
case "esc":
|
||||||
|
m.editingSlug = false
|
||||||
|
m.slugError = ""
|
||||||
|
return m, tea.Batch(tea.ClearScreen, textinput.Blink)
|
||||||
|
case "enter":
|
||||||
|
inputValue := m.slugInput.Value()
|
||||||
|
if err := m.interaction.sessionRegistry.Update(m.interaction.lifecycle.GetUser(), types.SessionKey{
|
||||||
|
Id: m.interaction.slugManager.Get(),
|
||||||
|
Type: types.HTTP,
|
||||||
|
}, types.SessionKey{
|
||||||
|
Id: inputValue,
|
||||||
|
Type: types.HTTP,
|
||||||
|
}); err != nil {
|
||||||
|
m.slugError = err.Error()
|
||||||
|
return m, nil
|
||||||
|
}
|
||||||
|
m.editingSlug = false
|
||||||
|
m.slugError = ""
|
||||||
|
return m, tea.Batch(tea.ClearScreen, textinput.Blink)
|
||||||
|
case "ctrl+c":
|
||||||
|
m.editingSlug = false
|
||||||
|
m.slugError = ""
|
||||||
|
return m, tea.Batch(tea.ClearScreen, textinput.Blink)
|
||||||
|
default:
|
||||||
|
if key.Matches(msg, m.keymap.random) {
|
||||||
|
newSubdomain := generateRandomSubdomain()
|
||||||
|
m.slugInput.SetValue(newSubdomain)
|
||||||
|
m.slugError = ""
|
||||||
|
m.slugInput, cmd = m.slugInput.Update(msg)
|
||||||
|
return m, cmd
|
||||||
|
}
|
||||||
|
m.slugError = ""
|
||||||
|
m.slugInput, cmd = m.slugInput.Update(msg)
|
||||||
|
return m, cmd
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if m.showingCommands {
|
if m.showingCommands {
|
||||||
return m.commandsUpdate(msg)
|
switch {
|
||||||
|
case key.Matches(msg, m.keymap.quit):
|
||||||
|
m.showingCommands = false
|
||||||
|
return m, tea.Batch(tea.ClearScreen, textinput.Blink)
|
||||||
|
case msg.String() == "enter":
|
||||||
|
selectedItem := m.commandList.SelectedItem()
|
||||||
|
if selectedItem != nil {
|
||||||
|
item := selectedItem.(commandItem)
|
||||||
|
if item.name == "slug" {
|
||||||
|
m.showingCommands = false
|
||||||
|
m.editingSlug = true
|
||||||
|
m.slugInput.SetValue(m.interaction.slugManager.Get())
|
||||||
|
m.slugInput.Focus()
|
||||||
|
return m, tea.Batch(tea.ClearScreen, textinput.Blink)
|
||||||
|
} else if item.name == "tunnel-type" {
|
||||||
|
m.showingCommands = false
|
||||||
|
m.showingComingSoon = true
|
||||||
|
return m, tea.Batch(tickCmd(5*time.Second), tea.ClearScreen, textinput.Blink)
|
||||||
|
}
|
||||||
|
m.showingCommands = false
|
||||||
|
return m, nil
|
||||||
|
}
|
||||||
|
case msg.String() == "esc":
|
||||||
|
m.showingCommands = false
|
||||||
|
return m, tea.Batch(tea.ClearScreen, textinput.Blink)
|
||||||
|
}
|
||||||
|
m.commandList, cmd = m.commandList.Update(msg)
|
||||||
|
return m, cmd
|
||||||
}
|
}
|
||||||
|
|
||||||
return m.dashboardUpdate(msg)
|
switch {
|
||||||
|
case key.Matches(msg, m.keymap.quit):
|
||||||
|
m.quitting = true
|
||||||
|
return m, tea.Batch(tea.ClearScreen, textinput.Blink, tea.Quit)
|
||||||
|
case key.Matches(msg, m.keymap.command):
|
||||||
|
m.showingCommands = true
|
||||||
|
return m, tea.Batch(tea.ClearScreen, textinput.Blink)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return m, nil
|
return m, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (i *interaction) Redraw() {
|
func (i *Interaction) Redraw() {
|
||||||
if i.program != nil {
|
if i.program != nil {
|
||||||
i.program.Send(tea.ClearScreen())
|
i.program.Send(tea.ClearScreen())
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (m *model) helpView() string {
|
||||||
|
return "\n" + m.help.ShortHelpView([]key.Binding{
|
||||||
|
m.keymap.command,
|
||||||
|
m.keymap.quit,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
func (m *model) View() string {
|
func (m *model) View() string {
|
||||||
if m.quitting {
|
if m.quitting {
|
||||||
return ""
|
return ""
|
||||||
}
|
}
|
||||||
|
|
||||||
if m.showingComingSoon {
|
if m.showingComingSoon {
|
||||||
return m.comingSoonView()
|
isCompact := shouldUseCompactLayout(m.width, 60)
|
||||||
|
|
||||||
|
var boxPadding int
|
||||||
|
var boxMargin int
|
||||||
|
if isCompact {
|
||||||
|
boxPadding = 1
|
||||||
|
boxMargin = 1
|
||||||
|
} else {
|
||||||
|
boxPadding = 3
|
||||||
|
boxMargin = 2
|
||||||
|
}
|
||||||
|
|
||||||
|
titleStyle := lipgloss.NewStyle().
|
||||||
|
Bold(true).
|
||||||
|
Foreground(lipgloss.Color("#7D56F4")).
|
||||||
|
PaddingTop(1).
|
||||||
|
PaddingBottom(1)
|
||||||
|
|
||||||
|
messageBoxWidth := getResponsiveWidth(m.width, 10, 30, 60)
|
||||||
|
messageBoxStyle := lipgloss.NewStyle().
|
||||||
|
Foreground(lipgloss.Color("#FAFAFA")).
|
||||||
|
Background(lipgloss.Color("#1A1A2E")).
|
||||||
|
Bold(true).
|
||||||
|
Border(lipgloss.RoundedBorder()).
|
||||||
|
BorderForeground(lipgloss.Color("#7D56F4")).
|
||||||
|
Padding(1, boxPadding).
|
||||||
|
MarginTop(boxMargin).
|
||||||
|
MarginBottom(boxMargin).
|
||||||
|
Width(messageBoxWidth).
|
||||||
|
Align(lipgloss.Center)
|
||||||
|
|
||||||
|
helpStyle := lipgloss.NewStyle().
|
||||||
|
Foreground(lipgloss.Color("#666666")).
|
||||||
|
Italic(true).
|
||||||
|
MarginTop(1)
|
||||||
|
|
||||||
|
var b strings.Builder
|
||||||
|
b.WriteString("\n\n")
|
||||||
|
|
||||||
|
var title string
|
||||||
|
if shouldUseCompactLayout(m.width, 40) {
|
||||||
|
title = "Coming Soon"
|
||||||
|
} else {
|
||||||
|
title = "⏳ Coming Soon"
|
||||||
|
}
|
||||||
|
b.WriteString(titleStyle.Render(title))
|
||||||
|
b.WriteString("\n\n")
|
||||||
|
|
||||||
|
var message string
|
||||||
|
if shouldUseCompactLayout(m.width, 50) {
|
||||||
|
message = "Coming soon!\nStay tuned."
|
||||||
|
} else {
|
||||||
|
message = "🚀 This feature is coming very soon!\n Stay tuned for updates."
|
||||||
|
}
|
||||||
|
b.WriteString(messageBoxStyle.Render(message))
|
||||||
|
b.WriteString("\n\n")
|
||||||
|
|
||||||
|
var helpText string
|
||||||
|
if shouldUseCompactLayout(m.width, 60) {
|
||||||
|
helpText = "Press any key..."
|
||||||
|
} else {
|
||||||
|
helpText = "This message will disappear in 5 seconds or press any key..."
|
||||||
|
}
|
||||||
|
b.WriteString(helpStyle.Render(helpText))
|
||||||
|
|
||||||
|
return b.String()
|
||||||
}
|
}
|
||||||
|
|
||||||
if m.editingSlug {
|
if m.editingSlug {
|
||||||
return m.slugView()
|
isCompact := shouldUseCompactLayout(m.width, 70)
|
||||||
|
isVeryCompact := shouldUseCompactLayout(m.width, 50)
|
||||||
|
|
||||||
|
var boxPadding int
|
||||||
|
var boxMargin int
|
||||||
|
if isVeryCompact {
|
||||||
|
boxPadding = 1
|
||||||
|
boxMargin = 1
|
||||||
|
} else if isCompact {
|
||||||
|
boxPadding = 1
|
||||||
|
boxMargin = 1
|
||||||
|
} else {
|
||||||
|
boxPadding = 2
|
||||||
|
boxMargin = 2
|
||||||
|
}
|
||||||
|
|
||||||
|
titleStyle := lipgloss.NewStyle().
|
||||||
|
Bold(true).
|
||||||
|
Foreground(lipgloss.Color("#7D56F4")).
|
||||||
|
PaddingTop(1).
|
||||||
|
PaddingBottom(1)
|
||||||
|
|
||||||
|
instructionStyle := lipgloss.NewStyle().
|
||||||
|
Foreground(lipgloss.Color("#FAFAFA")).
|
||||||
|
MarginTop(1)
|
||||||
|
|
||||||
|
inputBoxStyle := lipgloss.NewStyle().
|
||||||
|
Border(lipgloss.RoundedBorder()).
|
||||||
|
BorderForeground(lipgloss.Color("#7D56F4")).
|
||||||
|
Padding(1, boxPadding).
|
||||||
|
MarginTop(boxMargin).
|
||||||
|
MarginBottom(boxMargin)
|
||||||
|
|
||||||
|
helpStyle := lipgloss.NewStyle().
|
||||||
|
Foreground(lipgloss.Color("#666666")).
|
||||||
|
Italic(true).
|
||||||
|
MarginTop(1)
|
||||||
|
|
||||||
|
errorBoxStyle := lipgloss.NewStyle().
|
||||||
|
Foreground(lipgloss.Color("#FF0000")).
|
||||||
|
Background(lipgloss.Color("#3D0000")).
|
||||||
|
Bold(true).
|
||||||
|
Border(lipgloss.RoundedBorder()).
|
||||||
|
BorderForeground(lipgloss.Color("#FF0000")).
|
||||||
|
Padding(0, boxPadding).
|
||||||
|
MarginTop(1).
|
||||||
|
MarginBottom(1)
|
||||||
|
|
||||||
|
rulesBoxWidth := getResponsiveWidth(m.width, 10, 30, 60)
|
||||||
|
rulesBoxStyle := lipgloss.NewStyle().
|
||||||
|
Foreground(lipgloss.Color("#FAFAFA")).
|
||||||
|
Border(lipgloss.RoundedBorder()).
|
||||||
|
BorderForeground(lipgloss.Color("#7D56F4")).
|
||||||
|
Padding(0, boxPadding).
|
||||||
|
MarginTop(1).
|
||||||
|
MarginBottom(1).
|
||||||
|
Width(rulesBoxWidth)
|
||||||
|
|
||||||
|
var b strings.Builder
|
||||||
|
var title string
|
||||||
|
if isVeryCompact {
|
||||||
|
title = "Edit Subdomain"
|
||||||
|
} else {
|
||||||
|
title = "🔧 Edit Subdomain"
|
||||||
|
}
|
||||||
|
b.WriteString(titleStyle.Render(title))
|
||||||
|
b.WriteString("\n\n")
|
||||||
|
|
||||||
|
if m.tunnelType != types.HTTP {
|
||||||
|
warningBoxWidth := getResponsiveWidth(m.width, 10, 30, 60)
|
||||||
|
warningBoxStyle := lipgloss.NewStyle().
|
||||||
|
Foreground(lipgloss.Color("#FFA500")).
|
||||||
|
Background(lipgloss.Color("#3D2000")).
|
||||||
|
Bold(true).
|
||||||
|
Border(lipgloss.RoundedBorder()).
|
||||||
|
BorderForeground(lipgloss.Color("#FFA500")).
|
||||||
|
Padding(1, boxPadding).
|
||||||
|
MarginTop(boxMargin).
|
||||||
|
MarginBottom(boxMargin).
|
||||||
|
Width(warningBoxWidth)
|
||||||
|
|
||||||
|
var warningText string
|
||||||
|
if isVeryCompact {
|
||||||
|
warningText = "⚠️ TCP tunnels don't support custom subdomains."
|
||||||
|
} else {
|
||||||
|
warningText = "⚠️ TCP tunnels cannot have custom subdomains. Only HTTP/HTTPS tunnels support subdomain customization."
|
||||||
|
}
|
||||||
|
b.WriteString(warningBoxStyle.Render(warningText))
|
||||||
|
b.WriteString("\n\n")
|
||||||
|
|
||||||
|
var helpText string
|
||||||
|
if isVeryCompact {
|
||||||
|
helpText = "Press any key to go back"
|
||||||
|
} else {
|
||||||
|
helpText = "Press Enter or Esc to go back"
|
||||||
|
}
|
||||||
|
b.WriteString(helpStyle.Render(helpText))
|
||||||
|
return b.String()
|
||||||
|
}
|
||||||
|
|
||||||
|
var rulesContent string
|
||||||
|
if isVeryCompact {
|
||||||
|
rulesContent = "Rules:\n3-20 chars\na-z, 0-9, -\nNo leading/trailing -"
|
||||||
|
} else if isCompact {
|
||||||
|
rulesContent = "📋 Rules:\n • 3-20 chars\n • a-z, 0-9, -\n • No leading/trailing -"
|
||||||
|
} else {
|
||||||
|
rulesContent = "📋 Rules: \n\t• 3-20 chars \n\t• a-z, 0-9, - \n\t• No leading/trailing -"
|
||||||
|
}
|
||||||
|
b.WriteString(rulesBoxStyle.Render(rulesContent))
|
||||||
|
b.WriteString("\n")
|
||||||
|
|
||||||
|
var instruction string
|
||||||
|
if isVeryCompact {
|
||||||
|
instruction = "Custom subdomain:"
|
||||||
|
} else {
|
||||||
|
instruction = "Enter your custom subdomain:"
|
||||||
|
}
|
||||||
|
b.WriteString(instructionStyle.Render(instruction))
|
||||||
|
b.WriteString("\n")
|
||||||
|
|
||||||
|
if m.slugError != "" {
|
||||||
|
errorInputBoxStyle := lipgloss.NewStyle().
|
||||||
|
Border(lipgloss.RoundedBorder()).
|
||||||
|
BorderForeground(lipgloss.Color("#FF0000")).
|
||||||
|
Padding(1, boxPadding).
|
||||||
|
MarginTop(boxMargin).
|
||||||
|
MarginBottom(1)
|
||||||
|
b.WriteString(errorInputBoxStyle.Render(m.slugInput.View()))
|
||||||
|
b.WriteString("\n")
|
||||||
|
b.WriteString(errorBoxStyle.Render("❌ " + m.slugError))
|
||||||
|
b.WriteString("\n")
|
||||||
|
} else {
|
||||||
|
b.WriteString(inputBoxStyle.Render(m.slugInput.View()))
|
||||||
|
b.WriteString("\n")
|
||||||
|
}
|
||||||
|
|
||||||
|
previewURL := buildURL(m.protocol, m.slugInput.Value(), m.domain)
|
||||||
|
previewWidth := getResponsiveWidth(m.width, 10, 30, 80)
|
||||||
|
|
||||||
|
if len(previewURL) > previewWidth-10 {
|
||||||
|
previewURL = truncateString(previewURL, previewWidth-10)
|
||||||
|
}
|
||||||
|
|
||||||
|
previewStyle := lipgloss.NewStyle().
|
||||||
|
Foreground(lipgloss.Color("#04B575")).
|
||||||
|
Italic(true).
|
||||||
|
Width(previewWidth)
|
||||||
|
b.WriteString(previewStyle.Render(fmt.Sprintf("Preview: %s", previewURL)))
|
||||||
|
b.WriteString("\n")
|
||||||
|
|
||||||
|
var helpText string
|
||||||
|
if isVeryCompact {
|
||||||
|
helpText = "Enter: save • CTRL+R: random • Esc: cancel"
|
||||||
|
} else {
|
||||||
|
helpText = "Press Enter to save • CTRL+R for random • Esc to cancel"
|
||||||
|
}
|
||||||
|
b.WriteString(helpStyle.Render(helpText))
|
||||||
|
|
||||||
|
return b.String()
|
||||||
}
|
}
|
||||||
|
|
||||||
if m.showingCommands {
|
if m.showingCommands {
|
||||||
return m.commandsView()
|
isCompact := shouldUseCompactLayout(m.width, 60)
|
||||||
|
|
||||||
|
titleStyle := lipgloss.NewStyle().
|
||||||
|
Bold(true).
|
||||||
|
Foreground(lipgloss.Color("#7D56F4")).
|
||||||
|
PaddingTop(1).
|
||||||
|
PaddingBottom(1)
|
||||||
|
|
||||||
|
helpStyle := lipgloss.NewStyle().
|
||||||
|
Foreground(lipgloss.Color("#666666")).
|
||||||
|
Italic(true).
|
||||||
|
MarginTop(1)
|
||||||
|
|
||||||
|
var b strings.Builder
|
||||||
|
b.WriteString("\n")
|
||||||
|
|
||||||
|
var title string
|
||||||
|
if shouldUseCompactLayout(m.width, 40) {
|
||||||
|
title = "Commands"
|
||||||
|
} else {
|
||||||
|
title = "⚡ Commands"
|
||||||
|
}
|
||||||
|
b.WriteString(titleStyle.Render(title))
|
||||||
|
b.WriteString("\n\n")
|
||||||
|
b.WriteString(m.commandList.View())
|
||||||
|
b.WriteString("\n")
|
||||||
|
|
||||||
|
var helpText string
|
||||||
|
if isCompact {
|
||||||
|
helpText = "↑/↓ Nav • Enter Select • Esc Cancel"
|
||||||
|
} else {
|
||||||
|
helpText = "↑/↓ Navigate • Enter Select • Esc Cancel"
|
||||||
|
}
|
||||||
|
b.WriteString(helpStyle.Render(helpText))
|
||||||
|
|
||||||
|
return b.String()
|
||||||
}
|
}
|
||||||
|
|
||||||
return m.dashboardView()
|
titleStyle := lipgloss.NewStyle().
|
||||||
|
Bold(true).
|
||||||
|
Foreground(lipgloss.Color("#7D56F4")).
|
||||||
|
PaddingTop(1)
|
||||||
|
|
||||||
|
subtitleStyle := lipgloss.NewStyle().
|
||||||
|
Foreground(lipgloss.Color("#888888")).
|
||||||
|
Italic(true)
|
||||||
|
|
||||||
|
urlStyle := lipgloss.NewStyle().
|
||||||
|
Foreground(lipgloss.Color("#7D56F4")).
|
||||||
|
Underline(true).
|
||||||
|
Italic(true)
|
||||||
|
|
||||||
|
urlBoxStyle := lipgloss.NewStyle().
|
||||||
|
Foreground(lipgloss.Color("#04B575")).
|
||||||
|
Bold(true).
|
||||||
|
Italic(true)
|
||||||
|
|
||||||
|
keyHintStyle := lipgloss.NewStyle().
|
||||||
|
Foreground(lipgloss.Color("#7D56F4")).
|
||||||
|
Bold(true)
|
||||||
|
|
||||||
|
var b strings.Builder
|
||||||
|
|
||||||
|
isCompact := shouldUseCompactLayout(m.width, 85)
|
||||||
|
|
||||||
|
var asciiArtMargin int
|
||||||
|
if isCompact {
|
||||||
|
asciiArtMargin = 0
|
||||||
|
} else {
|
||||||
|
asciiArtMargin = 1
|
||||||
|
}
|
||||||
|
|
||||||
|
asciiArtStyle := lipgloss.NewStyle().
|
||||||
|
Bold(true).
|
||||||
|
Foreground(lipgloss.Color("#7D56F4")).
|
||||||
|
MarginBottom(asciiArtMargin)
|
||||||
|
|
||||||
|
var asciiArt string
|
||||||
|
if shouldUseCompactLayout(m.width, 50) {
|
||||||
|
asciiArt = "TUNNEL PLS"
|
||||||
|
} else if isCompact {
|
||||||
|
asciiArt = `
|
||||||
|
▀█▀ █ █ █▄ █ █▄ █ ██▀ █ ▄▀▀ █ ▄▀▀
|
||||||
|
█ ▀▄█ █ ▀█ █ ▀█ █▄▄ █▄▄ ▄█▀ █▄▄ ▄█▀`
|
||||||
|
} else {
|
||||||
|
asciiArt = `
|
||||||
|
████████╗██╗ ██╗███╗ ██╗███╗ ██╗███████╗██╗ ██████╗ ██╗ ███████╗
|
||||||
|
╚══██╔══╝██║ ██║████╗ ██║████╗ ██║██╔════╝██║ ██╔══██╗██║ ██╔════╝
|
||||||
|
██║ ██║ ██║██╔██╗ ██║██╔██╗ ██║█████╗ ██║ ██████╔╝██║ ███████╗
|
||||||
|
██║ ██║ ██║██║╚██╗██║██║╚██╗██║██╔══╝ ██║ ██╔═══╝ ██║ ╚════██║
|
||||||
|
██║ ╚██████╔╝██║ ╚████║██║ ╚████║███████╗███████╗ ██║ ███████╗███████║
|
||||||
|
╚═╝ ╚═════╝ ╚═╝ ╚═══╝╚═╝ ╚═══╝╚══════╝╚══════╝ ╚═╝ ╚══════╝╚══════╝`
|
||||||
|
}
|
||||||
|
|
||||||
|
b.WriteString(asciiArtStyle.Render(asciiArt))
|
||||||
|
b.WriteString("\n")
|
||||||
|
|
||||||
|
if !shouldUseCompactLayout(m.width, 60) {
|
||||||
|
b.WriteString(subtitleStyle.Render("Secure tunnel service by Bagas • "))
|
||||||
|
b.WriteString(urlStyle.Render("https://fossy.my.id"))
|
||||||
|
b.WriteString("\n\n")
|
||||||
|
} else {
|
||||||
|
b.WriteString("\n")
|
||||||
|
}
|
||||||
|
|
||||||
|
boxMaxWidth := getResponsiveWidth(m.width, 10, 40, 80)
|
||||||
|
var boxPadding int
|
||||||
|
var boxMargin int
|
||||||
|
if isCompact {
|
||||||
|
boxPadding = 1
|
||||||
|
boxMargin = 1
|
||||||
|
} else {
|
||||||
|
boxPadding = 2
|
||||||
|
boxMargin = 2
|
||||||
|
}
|
||||||
|
|
||||||
|
responsiveInfoBox := lipgloss.NewStyle().
|
||||||
|
Border(lipgloss.RoundedBorder()).
|
||||||
|
BorderForeground(lipgloss.Color("#7D56F4")).
|
||||||
|
Padding(1, boxPadding).
|
||||||
|
MarginTop(boxMargin).
|
||||||
|
MarginBottom(boxMargin).
|
||||||
|
Width(boxMaxWidth)
|
||||||
|
|
||||||
|
authenticatedUser := m.interaction.lifecycle.GetUser()
|
||||||
|
|
||||||
|
userInfoStyle := lipgloss.NewStyle().
|
||||||
|
Foreground(lipgloss.Color("#FAFAFA")).
|
||||||
|
Bold(true)
|
||||||
|
|
||||||
|
sectionHeaderStyle := lipgloss.NewStyle().
|
||||||
|
Foreground(lipgloss.Color("#888888")).
|
||||||
|
Bold(true)
|
||||||
|
|
||||||
|
addressStyle := lipgloss.NewStyle().
|
||||||
|
Foreground(lipgloss.Color("#FAFAFA"))
|
||||||
|
|
||||||
|
var infoContent string
|
||||||
|
if shouldUseCompactLayout(m.width, 70) {
|
||||||
|
infoContent = fmt.Sprintf("👤 %s\n\n%s\n%s",
|
||||||
|
userInfoStyle.Render(authenticatedUser),
|
||||||
|
sectionHeaderStyle.Render("🌐 FORWARDING ADDRESS:"),
|
||||||
|
addressStyle.Render(fmt.Sprintf(" %s", urlBoxStyle.Render(m.getTunnelURL()))))
|
||||||
|
} else {
|
||||||
|
infoContent = fmt.Sprintf("👤 Authenticated as: %s\n\n%s\n %s",
|
||||||
|
userInfoStyle.Render(authenticatedUser),
|
||||||
|
sectionHeaderStyle.Render("🌐 FORWARDING ADDRESS:"),
|
||||||
|
addressStyle.Render(urlBoxStyle.Render(m.getTunnelURL())))
|
||||||
|
}
|
||||||
|
|
||||||
|
b.WriteString(responsiveInfoBox.Render(infoContent))
|
||||||
|
b.WriteString("\n")
|
||||||
|
|
||||||
|
var quickActionsTitle string
|
||||||
|
if shouldUseCompactLayout(m.width, 50) {
|
||||||
|
quickActionsTitle = "Actions"
|
||||||
|
} else if isCompact {
|
||||||
|
quickActionsTitle = "Quick Actions"
|
||||||
|
} else {
|
||||||
|
quickActionsTitle = "✨ Quick Actions"
|
||||||
|
}
|
||||||
|
b.WriteString(titleStyle.Render(quickActionsTitle))
|
||||||
|
b.WriteString("\n")
|
||||||
|
|
||||||
|
var featureMargin int
|
||||||
|
if isCompact {
|
||||||
|
featureMargin = 1
|
||||||
|
} else {
|
||||||
|
featureMargin = 2
|
||||||
|
}
|
||||||
|
|
||||||
|
compactFeatureStyle := lipgloss.NewStyle().
|
||||||
|
Foreground(lipgloss.Color("#FAFAFA")).
|
||||||
|
MarginLeft(featureMargin)
|
||||||
|
|
||||||
|
var commandsText string
|
||||||
|
var quitText string
|
||||||
|
if shouldUseCompactLayout(m.width, 60) {
|
||||||
|
commandsText = fmt.Sprintf(" %s Commands", keyHintStyle.Render("[C]"))
|
||||||
|
quitText = fmt.Sprintf(" %s Quit", keyHintStyle.Render("[Q]"))
|
||||||
|
} else {
|
||||||
|
commandsText = fmt.Sprintf(" %s Open commands menu", keyHintStyle.Render("[C]"))
|
||||||
|
quitText = fmt.Sprintf(" %s Quit application", keyHintStyle.Render("[Q]"))
|
||||||
|
}
|
||||||
|
|
||||||
|
b.WriteString(compactFeatureStyle.Render(commandsText))
|
||||||
|
b.WriteString("\n")
|
||||||
|
b.WriteString(compactFeatureStyle.Render(quitText))
|
||||||
|
|
||||||
|
if !shouldUseCompactLayout(m.width, 70) {
|
||||||
|
b.WriteString("\n\n")
|
||||||
|
footerStyle := lipgloss.NewStyle().
|
||||||
|
Foreground(lipgloss.Color("#666666")).
|
||||||
|
Italic(true)
|
||||||
|
b.WriteString(footerStyle.Render("Press 'C' to customize your tunnel settings"))
|
||||||
|
}
|
||||||
|
|
||||||
|
return b.String()
|
||||||
}
|
}
|
||||||
|
|
||||||
func (i *interaction) Start() {
|
func (i *Interaction) Start() {
|
||||||
if i.mode == types.InteractiveModeHEADLESS {
|
if i.mode == types.HEADLESS {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
lipgloss.SetColorProfile(termenv.TrueColor)
|
lipgloss.SetColorProfile(termenv.TrueColor)
|
||||||
|
|
||||||
|
domain := config.Getenv("DOMAIN", "localhost")
|
||||||
protocol := "http"
|
protocol := "http"
|
||||||
if i.config.TLSEnabled() {
|
if config.Getenv("TLS_ENABLED", "false") == "true" {
|
||||||
protocol = "https"
|
protocol = "https"
|
||||||
}
|
}
|
||||||
|
|
||||||
tunnelType := i.forwarder.TunnelType()
|
tunnelType := i.forwarder.GetTunnelType()
|
||||||
port := i.forwarder.ForwardedPort()
|
port := i.forwarder.GetForwardedPort()
|
||||||
|
|
||||||
items := []list.Item{
|
items := []list.Item{
|
||||||
commandItem{name: "slug", desc: "Set custom subdomain"},
|
commandItem{name: "slug", desc: "Set custom subdomain"},
|
||||||
@@ -210,7 +803,7 @@ func (i *interaction) Start() {
|
|||||||
ti.Width = 50
|
ti.Width = 50
|
||||||
|
|
||||||
m := &model{
|
m := &model{
|
||||||
domain: i.config.Domain(),
|
domain: domain,
|
||||||
protocol: protocol,
|
protocol: protocol,
|
||||||
tunnelType: tunnelType,
|
tunnelType: tunnelType,
|
||||||
port: port,
|
port: port,
|
||||||
@@ -251,9 +844,15 @@ func (i *interaction) Start() {
|
|||||||
}
|
}
|
||||||
i.program.Kill()
|
i.program.Kill()
|
||||||
i.program = nil
|
i.program = nil
|
||||||
if i.closeFunc != nil {
|
if err := m.interaction.lifecycle.Close(); err != nil {
|
||||||
if err := i.closeFunc(); err != nil {
|
|
||||||
log.Printf("Cannot close session: %s \n", err)
|
log.Printf("Cannot close session: %s \n", err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func buildURL(protocol, subdomain, domain string) string {
|
||||||
|
return fmt.Sprintf("%s://%s.%s", protocol, subdomain, domain)
|
||||||
|
}
|
||||||
|
|
||||||
|
func generateRandomSubdomain() string {
|
||||||
|
return random.GenerateRandomString(20)
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,95 +0,0 @@
|
|||||||
package interaction
|
|
||||||
|
|
||||||
import (
|
|
||||||
"fmt"
|
|
||||||
"time"
|
|
||||||
"tunnel_pls/types"
|
|
||||||
|
|
||||||
"github.com/charmbracelet/bubbles/help"
|
|
||||||
"github.com/charmbracelet/bubbles/key"
|
|
||||||
"github.com/charmbracelet/bubbles/list"
|
|
||||||
"github.com/charmbracelet/bubbles/textinput"
|
|
||||||
tea "github.com/charmbracelet/bubbletea"
|
|
||||||
)
|
|
||||||
|
|
||||||
type commandItem struct {
|
|
||||||
name string
|
|
||||||
desc string
|
|
||||||
}
|
|
||||||
|
|
||||||
func (i commandItem) FilterValue() string { return i.name }
|
|
||||||
func (i commandItem) Title() string { return i.name }
|
|
||||||
func (i commandItem) Description() string { return i.desc }
|
|
||||||
|
|
||||||
type model struct {
|
|
||||||
domain string
|
|
||||||
protocol string
|
|
||||||
tunnelType types.TunnelType
|
|
||||||
port uint16
|
|
||||||
keymap keymap
|
|
||||||
help help.Model
|
|
||||||
quitting bool
|
|
||||||
showingCommands bool
|
|
||||||
editingSlug bool
|
|
||||||
showingComingSoon bool
|
|
||||||
commandList list.Model
|
|
||||||
slugInput textinput.Model
|
|
||||||
slugError string
|
|
||||||
interaction *interaction
|
|
||||||
width int
|
|
||||||
height int
|
|
||||||
}
|
|
||||||
|
|
||||||
func (m *model) getTunnelURL() string {
|
|
||||||
if m.tunnelType == types.TunnelTypeHTTP {
|
|
||||||
return buildURL(m.protocol, m.interaction.slug.String(), m.domain)
|
|
||||||
}
|
|
||||||
return fmt.Sprintf("tcp://%s:%d", m.domain, m.port)
|
|
||||||
}
|
|
||||||
|
|
||||||
type keymap struct {
|
|
||||||
quit key.Binding
|
|
||||||
command key.Binding
|
|
||||||
random key.Binding
|
|
||||||
}
|
|
||||||
|
|
||||||
type tickMsg time.Time
|
|
||||||
|
|
||||||
func (m *model) Init() tea.Cmd {
|
|
||||||
return tea.Batch(textinput.Blink, tea.WindowSize())
|
|
||||||
}
|
|
||||||
|
|
||||||
func getResponsiveWidth(screenWidth, padding, minWidth, maxWidth int) int {
|
|
||||||
width := screenWidth - padding
|
|
||||||
if width > maxWidth {
|
|
||||||
width = maxWidth
|
|
||||||
}
|
|
||||||
if width < minWidth {
|
|
||||||
width = minWidth
|
|
||||||
}
|
|
||||||
return width
|
|
||||||
}
|
|
||||||
|
|
||||||
func shouldUseCompactLayout(width int, threshold int) bool {
|
|
||||||
return width < threshold
|
|
||||||
}
|
|
||||||
|
|
||||||
func truncateString(s string, maxLength int) string {
|
|
||||||
if len(s) <= maxLength {
|
|
||||||
return s
|
|
||||||
}
|
|
||||||
if maxLength < 4 {
|
|
||||||
return s[:maxLength]
|
|
||||||
}
|
|
||||||
return s[:maxLength-3] + "..."
|
|
||||||
}
|
|
||||||
|
|
||||||
func tickCmd(d time.Duration) tea.Cmd {
|
|
||||||
return tea.Tick(d, func(t time.Time) tea.Msg {
|
|
||||||
return tickMsg(t)
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
func buildURL(protocol, subdomain, domain string) string {
|
|
||||||
return fmt.Sprintf("%s://%s.%s", protocol, subdomain, domain)
|
|
||||||
}
|
|
||||||
@@ -1,224 +0,0 @@
|
|||||||
package interaction
|
|
||||||
|
|
||||||
import (
|
|
||||||
"fmt"
|
|
||||||
"strings"
|
|
||||||
"tunnel_pls/internal/random"
|
|
||||||
"tunnel_pls/types"
|
|
||||||
|
|
||||||
"github.com/charmbracelet/bubbles/key"
|
|
||||||
"github.com/charmbracelet/bubbles/textinput"
|
|
||||||
tea "github.com/charmbracelet/bubbletea"
|
|
||||||
"github.com/charmbracelet/lipgloss"
|
|
||||||
)
|
|
||||||
|
|
||||||
func (m *model) slugUpdate(msg tea.KeyMsg) (tea.Model, tea.Cmd) {
|
|
||||||
var cmd tea.Cmd
|
|
||||||
|
|
||||||
if m.tunnelType != types.TunnelTypeHTTP {
|
|
||||||
m.editingSlug = false
|
|
||||||
m.slugError = ""
|
|
||||||
return m, tea.Batch(tea.ClearScreen, textinput.Blink)
|
|
||||||
}
|
|
||||||
|
|
||||||
switch msg.String() {
|
|
||||||
case "esc":
|
|
||||||
m.editingSlug = false
|
|
||||||
m.slugError = ""
|
|
||||||
return m, tea.Batch(tea.ClearScreen, textinput.Blink)
|
|
||||||
case "enter":
|
|
||||||
inputValue := m.slugInput.Value()
|
|
||||||
if err := m.interaction.sessionRegistry.Update(m.interaction.user, types.SessionKey{
|
|
||||||
Id: m.interaction.slug.String(),
|
|
||||||
Type: types.TunnelTypeHTTP,
|
|
||||||
}, types.SessionKey{
|
|
||||||
Id: inputValue,
|
|
||||||
Type: types.TunnelTypeHTTP,
|
|
||||||
}); err != nil {
|
|
||||||
m.slugError = err.Error()
|
|
||||||
return m, nil
|
|
||||||
}
|
|
||||||
m.editingSlug = false
|
|
||||||
m.slugError = ""
|
|
||||||
return m, tea.Batch(tea.ClearScreen, textinput.Blink)
|
|
||||||
case "ctrl+c":
|
|
||||||
m.editingSlug = false
|
|
||||||
m.slugError = ""
|
|
||||||
return m, tea.Batch(tea.ClearScreen, textinput.Blink)
|
|
||||||
default:
|
|
||||||
if key.Matches(msg, m.keymap.random) {
|
|
||||||
newSubdomain, err := random.GenerateRandomString(20)
|
|
||||||
if err != nil {
|
|
||||||
return m, cmd
|
|
||||||
}
|
|
||||||
m.slugInput.SetValue(newSubdomain)
|
|
||||||
m.slugError = ""
|
|
||||||
m.slugInput, cmd = m.slugInput.Update(msg)
|
|
||||||
}
|
|
||||||
m.slugError = ""
|
|
||||||
m.slugInput, cmd = m.slugInput.Update(msg)
|
|
||||||
return m, cmd
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (m *model) slugView() string {
|
|
||||||
isCompact := shouldUseCompactLayout(m.width, 70)
|
|
||||||
isVeryCompact := shouldUseCompactLayout(m.width, 50)
|
|
||||||
|
|
||||||
var boxPadding int
|
|
||||||
var boxMargin int
|
|
||||||
if isVeryCompact {
|
|
||||||
boxPadding = 1
|
|
||||||
boxMargin = 1
|
|
||||||
} else if isCompact {
|
|
||||||
boxPadding = 1
|
|
||||||
boxMargin = 1
|
|
||||||
} else {
|
|
||||||
boxPadding = 2
|
|
||||||
boxMargin = 2
|
|
||||||
}
|
|
||||||
|
|
||||||
titleStyle := lipgloss.NewStyle().
|
|
||||||
Bold(true).
|
|
||||||
Foreground(lipgloss.Color("#7D56F4")).
|
|
||||||
PaddingTop(1).
|
|
||||||
PaddingBottom(1)
|
|
||||||
|
|
||||||
instructionStyle := lipgloss.NewStyle().
|
|
||||||
Foreground(lipgloss.Color("#FAFAFA")).
|
|
||||||
MarginTop(1)
|
|
||||||
|
|
||||||
inputBoxStyle := lipgloss.NewStyle().
|
|
||||||
Border(lipgloss.RoundedBorder()).
|
|
||||||
BorderForeground(lipgloss.Color("#7D56F4")).
|
|
||||||
Padding(1, boxPadding).
|
|
||||||
MarginTop(boxMargin).
|
|
||||||
MarginBottom(boxMargin)
|
|
||||||
|
|
||||||
helpStyle := lipgloss.NewStyle().
|
|
||||||
Foreground(lipgloss.Color("#666666")).
|
|
||||||
Italic(true).
|
|
||||||
MarginTop(1)
|
|
||||||
|
|
||||||
errorBoxStyle := lipgloss.NewStyle().
|
|
||||||
Foreground(lipgloss.Color("#FF0000")).
|
|
||||||
Background(lipgloss.Color("#3D0000")).
|
|
||||||
Bold(true).
|
|
||||||
Border(lipgloss.RoundedBorder()).
|
|
||||||
BorderForeground(lipgloss.Color("#FF0000")).
|
|
||||||
Padding(0, boxPadding).
|
|
||||||
MarginTop(1).
|
|
||||||
MarginBottom(1)
|
|
||||||
|
|
||||||
rulesBoxWidth := getResponsiveWidth(m.width, 10, 30, 60)
|
|
||||||
rulesBoxStyle := lipgloss.NewStyle().
|
|
||||||
Foreground(lipgloss.Color("#FAFAFA")).
|
|
||||||
Border(lipgloss.RoundedBorder()).
|
|
||||||
BorderForeground(lipgloss.Color("#7D56F4")).
|
|
||||||
Padding(0, boxPadding).
|
|
||||||
MarginTop(1).
|
|
||||||
MarginBottom(1).
|
|
||||||
Width(rulesBoxWidth)
|
|
||||||
|
|
||||||
var b strings.Builder
|
|
||||||
var title string
|
|
||||||
if isVeryCompact {
|
|
||||||
title = "Edit Subdomain"
|
|
||||||
} else {
|
|
||||||
title = "🔧 Edit Subdomain"
|
|
||||||
}
|
|
||||||
b.WriteString(titleStyle.Render(title))
|
|
||||||
b.WriteString("\n\n")
|
|
||||||
|
|
||||||
if m.tunnelType != types.TunnelTypeHTTP {
|
|
||||||
warningBoxWidth := getResponsiveWidth(m.width, 10, 30, 60)
|
|
||||||
warningBoxStyle := lipgloss.NewStyle().
|
|
||||||
Foreground(lipgloss.Color("#FFA500")).
|
|
||||||
Background(lipgloss.Color("#3D2000")).
|
|
||||||
Bold(true).
|
|
||||||
Border(lipgloss.RoundedBorder()).
|
|
||||||
BorderForeground(lipgloss.Color("#FFA500")).
|
|
||||||
Padding(1, boxPadding).
|
|
||||||
MarginTop(boxMargin).
|
|
||||||
MarginBottom(boxMargin).
|
|
||||||
Width(warningBoxWidth)
|
|
||||||
|
|
||||||
var warningText string
|
|
||||||
if isVeryCompact {
|
|
||||||
warningText = "⚠️ TCP tunnels don't support custom subdomains."
|
|
||||||
} else {
|
|
||||||
warningText = "⚠️ TCP tunnels cannot have custom subdomains. Only HTTP/HTTPS tunnels support subdomain customization."
|
|
||||||
}
|
|
||||||
b.WriteString(warningBoxStyle.Render(warningText))
|
|
||||||
b.WriteString("\n\n")
|
|
||||||
|
|
||||||
var helpText string
|
|
||||||
if isVeryCompact {
|
|
||||||
helpText = "Press any key to go back"
|
|
||||||
} else {
|
|
||||||
helpText = "Press Enter or Esc to go back"
|
|
||||||
}
|
|
||||||
b.WriteString(helpStyle.Render(helpText))
|
|
||||||
return b.String()
|
|
||||||
}
|
|
||||||
|
|
||||||
var rulesContent string
|
|
||||||
if isVeryCompact {
|
|
||||||
rulesContent = "Rules:\n3-20 chars\na-z, 0-9, -\nNo leading/trailing -"
|
|
||||||
} else if isCompact {
|
|
||||||
rulesContent = "📋 Rules:\n • 3-20 chars\n • a-z, 0-9, -\n • No leading/trailing -"
|
|
||||||
} else {
|
|
||||||
rulesContent = "📋 Rules: \n\t• 3-20 chars \n\t• a-z, 0-9, - \n\t• No leading/trailing -"
|
|
||||||
}
|
|
||||||
b.WriteString(rulesBoxStyle.Render(rulesContent))
|
|
||||||
b.WriteString("\n")
|
|
||||||
|
|
||||||
var instruction string
|
|
||||||
if isVeryCompact {
|
|
||||||
instruction = "Custom subdomain:"
|
|
||||||
} else {
|
|
||||||
instruction = "Enter your custom subdomain:"
|
|
||||||
}
|
|
||||||
b.WriteString(instructionStyle.Render(instruction))
|
|
||||||
b.WriteString("\n")
|
|
||||||
|
|
||||||
if m.slugError != "" {
|
|
||||||
errorInputBoxStyle := lipgloss.NewStyle().
|
|
||||||
Border(lipgloss.RoundedBorder()).
|
|
||||||
BorderForeground(lipgloss.Color("#FF0000")).
|
|
||||||
Padding(1, boxPadding).
|
|
||||||
MarginTop(boxMargin).
|
|
||||||
MarginBottom(1)
|
|
||||||
b.WriteString(errorInputBoxStyle.Render(m.slugInput.View()))
|
|
||||||
b.WriteString("\n")
|
|
||||||
b.WriteString(errorBoxStyle.Render("❌ " + m.slugError))
|
|
||||||
b.WriteString("\n")
|
|
||||||
} else {
|
|
||||||
b.WriteString(inputBoxStyle.Render(m.slugInput.View()))
|
|
||||||
b.WriteString("\n")
|
|
||||||
}
|
|
||||||
|
|
||||||
previewURL := buildURL(m.protocol, m.slugInput.Value(), m.domain)
|
|
||||||
previewWidth := getResponsiveWidth(m.width, 10, 30, 80)
|
|
||||||
|
|
||||||
if len(previewURL) > previewWidth-10 {
|
|
||||||
previewURL = truncateString(previewURL, previewWidth-10)
|
|
||||||
}
|
|
||||||
|
|
||||||
previewStyle := lipgloss.NewStyle().
|
|
||||||
Foreground(lipgloss.Color("#04B575")).
|
|
||||||
Italic(true).
|
|
||||||
Width(previewWidth)
|
|
||||||
b.WriteString(previewStyle.Render(fmt.Sprintf("Preview: %s", previewURL)))
|
|
||||||
b.WriteString("\n")
|
|
||||||
|
|
||||||
var helpText string
|
|
||||||
if isVeryCompact {
|
|
||||||
helpText = "Enter: save • CTRL+R: random • Esc: cancel"
|
|
||||||
} else {
|
|
||||||
helpText = "Press Enter to save • CTRL+R for random • Esc to cancel"
|
|
||||||
}
|
|
||||||
b.WriteString(helpStyle.Render(helpText))
|
|
||||||
|
|
||||||
return b.String()
|
|
||||||
}
|
|
||||||
@@ -2,6 +2,8 @@ package lifecycle
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"errors"
|
"errors"
|
||||||
|
"io"
|
||||||
|
"net"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
portUtil "tunnel_pls/internal/port"
|
portUtil "tunnel_pls/internal/port"
|
||||||
@@ -13,114 +15,115 @@ import (
|
|||||||
|
|
||||||
type Forwarder interface {
|
type Forwarder interface {
|
||||||
Close() error
|
Close() error
|
||||||
TunnelType() types.TunnelType
|
GetTunnelType() types.TunnelType
|
||||||
ForwardedPort() uint16
|
GetForwardedPort() uint16
|
||||||
}
|
}
|
||||||
|
|
||||||
type SessionRegistry interface {
|
type SessionRegistry interface {
|
||||||
Remove(key types.SessionKey)
|
Remove(key types.SessionKey)
|
||||||
}
|
}
|
||||||
|
|
||||||
type lifecycle struct {
|
type Lifecycle struct {
|
||||||
status types.SessionStatus
|
status types.Status
|
||||||
conn ssh.Conn
|
conn ssh.Conn
|
||||||
channel ssh.Channel
|
channel ssh.Channel
|
||||||
forwarder Forwarder
|
forwarder Forwarder
|
||||||
slug slug.Slug
|
|
||||||
startedAt time.Time
|
|
||||||
sessionRegistry SessionRegistry
|
sessionRegistry SessionRegistry
|
||||||
portRegistry portUtil.Port
|
slugManager slug.Manager
|
||||||
|
startedAt time.Time
|
||||||
user string
|
user string
|
||||||
}
|
}
|
||||||
|
|
||||||
func New(conn ssh.Conn, forwarder Forwarder, slugManager slug.Slug, port portUtil.Port, sessionRegistry SessionRegistry, user string) Lifecycle {
|
func NewLifecycle(conn ssh.Conn, forwarder Forwarder, slugManager slug.Manager, user string) *Lifecycle {
|
||||||
return &lifecycle{
|
return &Lifecycle{
|
||||||
status: types.SessionStatusINITIALIZING,
|
status: types.INITIALIZING,
|
||||||
conn: conn,
|
conn: conn,
|
||||||
channel: nil,
|
channel: nil,
|
||||||
forwarder: forwarder,
|
forwarder: forwarder,
|
||||||
slug: slugManager,
|
slugManager: slugManager,
|
||||||
|
sessionRegistry: nil,
|
||||||
startedAt: time.Now(),
|
startedAt: time.Now(),
|
||||||
sessionRegistry: sessionRegistry,
|
|
||||||
portRegistry: port,
|
|
||||||
user: user,
|
user: user,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
type Lifecycle interface {
|
func (l *Lifecycle) SetSessionRegistry(registry SessionRegistry) {
|
||||||
Connection() ssh.Conn
|
l.sessionRegistry = registry
|
||||||
PortRegistry() portUtil.Port
|
}
|
||||||
User() string
|
|
||||||
|
type SessionLifecycle interface {
|
||||||
|
Close() error
|
||||||
|
SetStatus(status types.Status)
|
||||||
|
GetConnection() ssh.Conn
|
||||||
|
GetChannel() ssh.Channel
|
||||||
|
GetUser() string
|
||||||
SetChannel(channel ssh.Channel)
|
SetChannel(channel ssh.Channel)
|
||||||
SetStatus(status types.SessionStatus)
|
SetSessionRegistry(registry SessionRegistry)
|
||||||
IsActive() bool
|
IsActive() bool
|
||||||
StartedAt() time.Time
|
StartedAt() time.Time
|
||||||
Close() error
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (l *lifecycle) PortRegistry() portUtil.Port {
|
func (l *Lifecycle) GetUser() string {
|
||||||
return l.portRegistry
|
|
||||||
}
|
|
||||||
|
|
||||||
func (l *lifecycle) User() string {
|
|
||||||
return l.user
|
return l.user
|
||||||
}
|
}
|
||||||
|
|
||||||
func (l *lifecycle) SetChannel(channel ssh.Channel) {
|
func (l *Lifecycle) GetChannel() ssh.Channel {
|
||||||
|
return l.channel
|
||||||
|
}
|
||||||
|
|
||||||
|
func (l *Lifecycle) SetChannel(channel ssh.Channel) {
|
||||||
l.channel = channel
|
l.channel = channel
|
||||||
}
|
}
|
||||||
func (l *lifecycle) Connection() ssh.Conn {
|
func (l *Lifecycle) GetConnection() ssh.Conn {
|
||||||
return l.conn
|
return l.conn
|
||||||
}
|
}
|
||||||
func (l *lifecycle) SetStatus(status types.SessionStatus) {
|
func (l *Lifecycle) SetStatus(status types.Status) {
|
||||||
l.status = status
|
l.status = status
|
||||||
if status == types.SessionStatusRUNNING && l.startedAt.IsZero() {
|
if status == types.RUNNING && l.startedAt.IsZero() {
|
||||||
l.startedAt = time.Now()
|
l.startedAt = time.Now()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func closeIfNotNil(c interface{ Close() error }) error {
|
func (l *Lifecycle) Close() error {
|
||||||
if c != nil {
|
err := l.forwarder.Close()
|
||||||
return c.Close()
|
if err != nil && !errors.Is(err, net.ErrClosed) {
|
||||||
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if l.channel != nil {
|
||||||
|
err := l.channel.Close()
|
||||||
|
if err != nil && !errors.Is(err, io.EOF) {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if l.conn != nil {
|
||||||
|
err := l.conn.Close()
|
||||||
|
if err != nil && !errors.Is(err, net.ErrClosed) {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
clientSlug := l.slugManager.Get()
|
||||||
|
if clientSlug != "" && l.sessionRegistry.Remove != nil {
|
||||||
|
key := types.SessionKey{Id: clientSlug, Type: l.forwarder.GetTunnelType()}
|
||||||
|
l.sessionRegistry.Remove(key)
|
||||||
|
}
|
||||||
|
|
||||||
|
if l.forwarder.GetTunnelType() == types.TCP {
|
||||||
|
err = portUtil.Default.SetPortStatus(l.forwarder.GetForwardedPort(), false)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (l *lifecycle) Close() error {
|
func (l *Lifecycle) IsActive() bool {
|
||||||
var errs []error
|
return l.status == types.RUNNING
|
||||||
tunnelType := l.forwarder.TunnelType()
|
|
||||||
|
|
||||||
if err := closeIfNotNil(l.channel); err != nil {
|
|
||||||
errs = append(errs, err)
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := closeIfNotNil(l.conn); err != nil {
|
|
||||||
errs = append(errs, err)
|
|
||||||
}
|
|
||||||
|
|
||||||
clientSlug := l.slug.String()
|
|
||||||
key := types.SessionKey{
|
|
||||||
Id: clientSlug,
|
|
||||||
Type: tunnelType,
|
|
||||||
}
|
|
||||||
l.sessionRegistry.Remove(key)
|
|
||||||
|
|
||||||
if tunnelType == types.TunnelTypeTCP {
|
|
||||||
if err := l.PortRegistry().SetStatus(l.forwarder.ForwardedPort(), false); err != nil {
|
|
||||||
errs = append(errs, err)
|
|
||||||
}
|
|
||||||
if err := l.forwarder.Close(); err != nil {
|
|
||||||
errs = append(errs, err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return errors.Join(errs...)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (l *lifecycle) IsActive() bool {
|
func (l *Lifecycle) StartedAt() time.Time {
|
||||||
return l.status == types.SessionStatusRUNNING
|
|
||||||
}
|
|
||||||
|
|
||||||
func (l *lifecycle) StartedAt() time.Time {
|
|
||||||
return l.startedAt
|
return l.startedAt
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,124 +1,103 @@
|
|||||||
package registry
|
package session
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"sync"
|
"sync"
|
||||||
"tunnel_pls/session/forwarder"
|
|
||||||
"tunnel_pls/session/interaction"
|
|
||||||
"tunnel_pls/session/lifecycle"
|
|
||||||
"tunnel_pls/session/slug"
|
|
||||||
"tunnel_pls/types"
|
"tunnel_pls/types"
|
||||||
)
|
)
|
||||||
|
|
||||||
type Key = types.SessionKey
|
type Key = types.SessionKey
|
||||||
|
|
||||||
type Session interface {
|
|
||||||
Lifecycle() lifecycle.Lifecycle
|
|
||||||
Interaction() interaction.Interaction
|
|
||||||
Forwarder() forwarder.Forwarder
|
|
||||||
Slug() slug.Slug
|
|
||||||
Detail() *types.Detail
|
|
||||||
}
|
|
||||||
|
|
||||||
type Registry interface {
|
type Registry interface {
|
||||||
Get(key Key) (session Session, err error)
|
Get(key Key) (session *SSHSession, err error)
|
||||||
GetWithUser(user string, key Key) (session Session, err error)
|
GetWithUser(user string, key Key) (session *SSHSession, err error)
|
||||||
Update(user string, oldKey, newKey Key) error
|
Update(user string, oldKey, newKey Key) error
|
||||||
Register(key Key, session Session) (success bool)
|
Register(key Key, session *SSHSession) (success bool)
|
||||||
Remove(key Key)
|
Remove(key Key)
|
||||||
GetAllSessionFromUser(user string) []Session
|
GetAllSessionFromUser(user string) []*SSHSession
|
||||||
}
|
}
|
||||||
type registry struct {
|
type registry struct {
|
||||||
mu sync.RWMutex
|
mu sync.RWMutex
|
||||||
byUser map[string]map[Key]Session
|
byUser map[string]map[Key]*SSHSession
|
||||||
slugIndex map[Key]string
|
slugIndex map[Key]string
|
||||||
}
|
}
|
||||||
|
|
||||||
var (
|
|
||||||
ErrSessionNotFound = fmt.Errorf("session not found")
|
|
||||||
ErrSlugInUse = fmt.Errorf("slug already in use")
|
|
||||||
ErrInvalidSlug = fmt.Errorf("invalid slug")
|
|
||||||
ErrForbiddenSlug = fmt.Errorf("forbidden slug")
|
|
||||||
ErrSlugChangeNotAllowed = fmt.Errorf("slug change not allowed for this tunnel type")
|
|
||||||
ErrSlugUnchanged = fmt.Errorf("slug is unchanged")
|
|
||||||
)
|
|
||||||
|
|
||||||
func NewRegistry() Registry {
|
func NewRegistry() Registry {
|
||||||
return ®istry{
|
return ®istry{
|
||||||
byUser: make(map[string]map[Key]Session),
|
byUser: make(map[string]map[Key]*SSHSession),
|
||||||
slugIndex: make(map[Key]string),
|
slugIndex: make(map[Key]string),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (r *registry) Get(key Key) (session Session, err error) {
|
func (r *registry) Get(key Key) (session *SSHSession, err error) {
|
||||||
r.mu.RLock()
|
r.mu.RLock()
|
||||||
defer r.mu.RUnlock()
|
defer r.mu.RUnlock()
|
||||||
|
|
||||||
userID, ok := r.slugIndex[key]
|
userID, ok := r.slugIndex[key]
|
||||||
if !ok {
|
if !ok {
|
||||||
return nil, ErrSessionNotFound
|
return nil, fmt.Errorf("session not found")
|
||||||
}
|
}
|
||||||
|
|
||||||
client, ok := r.byUser[userID][key]
|
client, ok := r.byUser[userID][key]
|
||||||
if !ok {
|
if !ok {
|
||||||
return nil, ErrSessionNotFound
|
return nil, fmt.Errorf("session not found")
|
||||||
}
|
}
|
||||||
return client, nil
|
return client, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (r *registry) GetWithUser(user string, key Key) (session Session, err error) {
|
func (r *registry) GetWithUser(user string, key Key) (session *SSHSession, err error) {
|
||||||
r.mu.RLock()
|
r.mu.RLock()
|
||||||
defer r.mu.RUnlock()
|
defer r.mu.RUnlock()
|
||||||
|
|
||||||
client, ok := r.byUser[user][key]
|
client, ok := r.byUser[user][key]
|
||||||
if !ok {
|
if !ok {
|
||||||
return nil, ErrSessionNotFound
|
return nil, fmt.Errorf("session not found")
|
||||||
}
|
}
|
||||||
return client, nil
|
return client, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (r *registry) Update(user string, oldKey, newKey Key) error {
|
func (r *registry) Update(user string, oldKey, newKey Key) error {
|
||||||
if oldKey.Type != newKey.Type {
|
if oldKey.Type != newKey.Type {
|
||||||
return ErrSlugUnchanged
|
return fmt.Errorf("tunnel type cannot change")
|
||||||
}
|
}
|
||||||
|
|
||||||
if newKey.Type != types.TunnelTypeHTTP {
|
if newKey.Type != types.HTTP {
|
||||||
return ErrSlugChangeNotAllowed
|
return fmt.Errorf("non http tunnel cannot change slug")
|
||||||
}
|
}
|
||||||
|
|
||||||
if isForbiddenSlug(newKey.Id) {
|
if isForbiddenSlug(newKey.Id) {
|
||||||
return ErrForbiddenSlug
|
return fmt.Errorf("this subdomain is reserved. Please choose a different one")
|
||||||
}
|
}
|
||||||
|
|
||||||
if !isValidSlug(newKey.Id) {
|
if !isValidSlug(newKey.Id) {
|
||||||
return ErrInvalidSlug
|
return fmt.Errorf("invalid subdomain. Follow the rules")
|
||||||
}
|
}
|
||||||
|
|
||||||
r.mu.Lock()
|
r.mu.Lock()
|
||||||
defer r.mu.Unlock()
|
defer r.mu.Unlock()
|
||||||
|
|
||||||
if _, exists := r.slugIndex[newKey]; exists && newKey != oldKey {
|
if _, exists := r.slugIndex[newKey]; exists && newKey != oldKey {
|
||||||
return ErrSlugInUse
|
return fmt.Errorf("someone already uses this subdomain")
|
||||||
}
|
}
|
||||||
client, ok := r.byUser[user][oldKey]
|
client, ok := r.byUser[user][oldKey]
|
||||||
if !ok {
|
if !ok {
|
||||||
return ErrSessionNotFound
|
return fmt.Errorf("session not found")
|
||||||
}
|
}
|
||||||
|
|
||||||
delete(r.byUser[user], oldKey)
|
delete(r.byUser[user], oldKey)
|
||||||
delete(r.slugIndex, oldKey)
|
delete(r.slugIndex, oldKey)
|
||||||
|
|
||||||
client.Slug().Set(newKey.Id)
|
client.slugManager.Set(newKey.Id)
|
||||||
r.slugIndex[newKey] = user
|
r.slugIndex[newKey] = user
|
||||||
|
|
||||||
if r.byUser[user] == nil {
|
if r.byUser[user] == nil {
|
||||||
r.byUser[user] = make(map[Key]Session)
|
r.byUser[user] = make(map[Key]*SSHSession)
|
||||||
}
|
}
|
||||||
r.byUser[user][newKey] = client
|
r.byUser[user][newKey] = client
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (r *registry) Register(key Key, userSession Session) (success bool) {
|
func (r *registry) Register(key Key, session *SSHSession) (success bool) {
|
||||||
r.mu.Lock()
|
r.mu.Lock()
|
||||||
defer r.mu.Unlock()
|
defer r.mu.Unlock()
|
||||||
|
|
||||||
@@ -126,26 +105,26 @@ func (r *registry) Register(key Key, userSession Session) (success bool) {
|
|||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
userID := userSession.Lifecycle().User()
|
userID := session.lifecycle.GetUser()
|
||||||
if r.byUser[userID] == nil {
|
if r.byUser[userID] == nil {
|
||||||
r.byUser[userID] = make(map[Key]Session)
|
r.byUser[userID] = make(map[Key]*SSHSession)
|
||||||
}
|
}
|
||||||
|
|
||||||
r.byUser[userID][key] = userSession
|
r.byUser[userID][key] = session
|
||||||
r.slugIndex[key] = userID
|
r.slugIndex[key] = userID
|
||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
|
|
||||||
func (r *registry) GetAllSessionFromUser(user string) []Session {
|
func (r *registry) GetAllSessionFromUser(user string) []*SSHSession {
|
||||||
r.mu.RLock()
|
r.mu.RLock()
|
||||||
defer r.mu.RUnlock()
|
defer r.mu.RUnlock()
|
||||||
|
|
||||||
m := r.byUser[user]
|
m := r.byUser[user]
|
||||||
if len(m) == 0 {
|
if len(m) == 0 {
|
||||||
return []Session{}
|
return []*SSHSession{}
|
||||||
}
|
}
|
||||||
|
|
||||||
sessions := make([]Session, 0, len(m))
|
sessions := make([]*SSHSession, 0, len(m))
|
||||||
for _, s := range m {
|
for _, s := range m {
|
||||||
sessions = append(sessions, s)
|
sessions = append(sessions, s)
|
||||||
}
|
}
|
||||||
+80
-334
@@ -1,19 +1,10 @@
|
|||||||
package session
|
package session
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
|
||||||
"encoding/binary"
|
|
||||||
"errors"
|
|
||||||
"fmt"
|
"fmt"
|
||||||
"io"
|
|
||||||
"log"
|
"log"
|
||||||
"net"
|
|
||||||
"time"
|
"time"
|
||||||
"tunnel_pls/internal/config"
|
"tunnel_pls/internal/config"
|
||||||
portUtil "tunnel_pls/internal/port"
|
|
||||||
"tunnel_pls/internal/random"
|
|
||||||
"tunnel_pls/internal/registry"
|
|
||||||
"tunnel_pls/internal/transport"
|
|
||||||
"tunnel_pls/session/forwarder"
|
"tunnel_pls/session/forwarder"
|
||||||
"tunnel_pls/session/interaction"
|
"tunnel_pls/session/interaction"
|
||||||
"tunnel_pls/session/lifecycle"
|
"tunnel_pls/session/lifecycle"
|
||||||
@@ -24,143 +15,104 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
type Session interface {
|
type Session interface {
|
||||||
HandleGlobalRequest(ch <-chan *ssh.Request) error
|
HandleGlobalRequest(ch <-chan *ssh.Request)
|
||||||
HandleTCPIPForward(req *ssh.Request) error
|
HandleTCPIPForward(req *ssh.Request)
|
||||||
HandleHTTPForward(req *ssh.Request, port uint16) error
|
HandleHTTPForward(req *ssh.Request, port uint16)
|
||||||
HandleTCPForward(req *ssh.Request, addr string, port uint16) error
|
HandleTCPForward(req *ssh.Request, addr string, port uint16)
|
||||||
Lifecycle() lifecycle.Lifecycle
|
|
||||||
Interaction() interaction.Interaction
|
|
||||||
Forwarder() forwarder.Forwarder
|
|
||||||
Slug() slug.Slug
|
|
||||||
Detail() *types.Detail
|
|
||||||
Start() error
|
|
||||||
}
|
}
|
||||||
|
|
||||||
type session struct {
|
type SSHSession struct {
|
||||||
config config.Config
|
|
||||||
initialReq <-chan *ssh.Request
|
initialReq <-chan *ssh.Request
|
||||||
sshChan <-chan ssh.NewChannel
|
sshReqChannel <-chan ssh.NewChannel
|
||||||
lifecycle lifecycle.Lifecycle
|
lifecycle lifecycle.SessionLifecycle
|
||||||
interaction interaction.Interaction
|
interaction interaction.Controller
|
||||||
forwarder forwarder.Forwarder
|
forwarder forwarder.ForwardingController
|
||||||
slug slug.Slug
|
slugManager slug.Manager
|
||||||
registry registry.Registry
|
registry Registry
|
||||||
}
|
}
|
||||||
|
|
||||||
var blockedReservedPorts = []uint16{1080, 1433, 1521, 1900, 2049, 3306, 3389, 5432, 5900, 6379, 8080, 8443, 9000, 9200, 27017}
|
func (s *SSHSession) GetLifecycle() lifecycle.SessionLifecycle {
|
||||||
|
return s.lifecycle
|
||||||
|
}
|
||||||
|
|
||||||
func New(config config.Config, conn *ssh.ServerConn, initialReq <-chan *ssh.Request, sshChan <-chan ssh.NewChannel, sessionRegistry registry.Registry, portRegistry portUtil.Port, user string) Session {
|
func (s *SSHSession) GetInteraction() interaction.Controller {
|
||||||
slugManager := slug.New()
|
return s.interaction
|
||||||
forwarderManager := forwarder.New(config, slugManager, conn)
|
}
|
||||||
lifecycleManager := lifecycle.New(conn, forwarderManager, slugManager, portRegistry, sessionRegistry, user)
|
|
||||||
interactionManager := interaction.New(config, slugManager, forwarderManager, sessionRegistry, user, lifecycleManager.Close)
|
|
||||||
|
|
||||||
return &session{
|
func (s *SSHSession) GetForwarder() forwarder.ForwardingController {
|
||||||
config: config,
|
return s.forwarder
|
||||||
initialReq: initialReq,
|
}
|
||||||
sshChan: sshChan,
|
|
||||||
|
func (s *SSHSession) GetSlugManager() slug.Manager {
|
||||||
|
return s.slugManager
|
||||||
|
}
|
||||||
|
|
||||||
|
func New(conn *ssh.ServerConn, forwardingReq <-chan *ssh.Request, sshChan <-chan ssh.NewChannel, sessionRegistry Registry, user string) *SSHSession {
|
||||||
|
slugManager := slug.NewManager()
|
||||||
|
forwarderManager := forwarder.NewForwarder(slugManager)
|
||||||
|
interactionManager := interaction.NewInteraction(slugManager, forwarderManager)
|
||||||
|
lifecycleManager := lifecycle.NewLifecycle(conn, forwarderManager, slugManager, user)
|
||||||
|
|
||||||
|
interactionManager.SetLifecycle(lifecycleManager)
|
||||||
|
forwarderManager.SetLifecycle(lifecycleManager)
|
||||||
|
interactionManager.SetSessionRegistry(sessionRegistry)
|
||||||
|
lifecycleManager.SetSessionRegistry(sessionRegistry)
|
||||||
|
|
||||||
|
return &SSHSession{
|
||||||
|
initialReq: forwardingReq,
|
||||||
|
sshReqChannel: sshChan,
|
||||||
lifecycle: lifecycleManager,
|
lifecycle: lifecycleManager,
|
||||||
interaction: interactionManager,
|
interaction: interactionManager,
|
||||||
forwarder: forwarderManager,
|
forwarder: forwarderManager,
|
||||||
slug: slugManager,
|
slugManager: slugManager,
|
||||||
registry: sessionRegistry,
|
registry: sessionRegistry,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *session) Lifecycle() lifecycle.Lifecycle {
|
type Detail struct {
|
||||||
return s.lifecycle
|
ForwardingType string `json:"forwarding_type,omitempty"`
|
||||||
|
Slug string `json:"slug,omitempty"`
|
||||||
|
UserID string `json:"user_id,omitempty"`
|
||||||
|
Active bool `json:"active,omitempty"`
|
||||||
|
StartedAt time.Time `json:"started_at,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *session) Interaction() interaction.Interaction {
|
func (s *SSHSession) Detail() Detail {
|
||||||
return s.interaction
|
return Detail{
|
||||||
}
|
ForwardingType: string(s.forwarder.GetTunnelType()),
|
||||||
|
Slug: s.slugManager.Get(),
|
||||||
func (s *session) Forwarder() forwarder.Forwarder {
|
UserID: s.lifecycle.GetUser(),
|
||||||
return s.forwarder
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *session) Slug() slug.Slug {
|
|
||||||
return s.slug
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *session) Detail() *types.Detail {
|
|
||||||
tunnelTypeMap := map[types.TunnelType]string{
|
|
||||||
types.TunnelTypeHTTP: "TunnelTypeHTTP",
|
|
||||||
types.TunnelTypeTCP: "TunnelTypeTCP",
|
|
||||||
}
|
|
||||||
tunnelType, ok := tunnelTypeMap[s.forwarder.TunnelType()]
|
|
||||||
if !ok {
|
|
||||||
tunnelType = "TunnelTypeUNKNOWN"
|
|
||||||
}
|
|
||||||
|
|
||||||
return &types.Detail{
|
|
||||||
ForwardingType: tunnelType,
|
|
||||||
Slug: s.slug.String(),
|
|
||||||
UserID: s.lifecycle.User(),
|
|
||||||
Active: s.lifecycle.IsActive(),
|
Active: s.lifecycle.IsActive(),
|
||||||
StartedAt: s.lifecycle.StartedAt(),
|
StartedAt: s.lifecycle.StartedAt(),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *session) Start() error {
|
func (s *SSHSession) Start() error {
|
||||||
if err := s.setupSessionMode(); err != nil {
|
var channel ssh.NewChannel
|
||||||
return err
|
var ok bool
|
||||||
}
|
|
||||||
|
|
||||||
tcpipReq := s.waitForTCPIPForward()
|
|
||||||
if tcpipReq == nil {
|
|
||||||
return s.handleMissingForwardRequest()
|
|
||||||
}
|
|
||||||
|
|
||||||
if s.shouldRejectUnauthorized() {
|
|
||||||
return s.denyForwardingRequest(tcpipReq, nil, nil, fmt.Sprintf("headless forwarding only allowed on node mode"))
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := s.HandleTCPIPForward(tcpipReq); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
s.interaction.Start()
|
|
||||||
|
|
||||||
return s.waitForSessionEnd()
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *session) setupSessionMode() error {
|
|
||||||
select {
|
select {
|
||||||
case channel, ok := <-s.sshChan:
|
case channel, ok = <-s.sshReqChannel:
|
||||||
if !ok {
|
if !ok {
|
||||||
log.Println("Forwarding request channel closed")
|
log.Println("Forwarding request channel closed")
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
return s.setupInteractiveMode(channel)
|
|
||||||
case <-time.After(500 * time.Millisecond):
|
|
||||||
s.interaction.SetMode(types.InteractiveModeHEADLESS)
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *session) setupInteractiveMode(channel ssh.NewChannel) error {
|
|
||||||
ch, reqs, err := channel.Accept()
|
ch, reqs, err := channel.Accept()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Printf("failed to accept channel: %v", err)
|
log.Printf("failed to accept channel: %v", err)
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
go s.HandleGlobalRequest(reqs)
|
||||||
go func() {
|
|
||||||
err = s.HandleGlobalRequest(reqs)
|
|
||||||
if err != nil {
|
|
||||||
log.Printf("global request handler error: %v", err)
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
|
|
||||||
s.lifecycle.SetChannel(ch)
|
s.lifecycle.SetChannel(ch)
|
||||||
s.interaction.SetChannel(ch)
|
s.interaction.SetChannel(ch)
|
||||||
s.interaction.SetMode(types.InteractiveModeINTERACTIVE)
|
s.interaction.SetMode(types.INTERACTIVE)
|
||||||
|
case <-time.After(500 * time.Millisecond):
|
||||||
|
s.interaction.SetMode(types.HEADLESS)
|
||||||
|
}
|
||||||
|
|
||||||
return nil
|
tcpipReq := s.waitForTCPIPForward()
|
||||||
}
|
if tcpipReq == nil {
|
||||||
|
err := s.interaction.Send(fmt.Sprintf("Port forwarding request not received. Ensure you ran the correct command with -R flag. Example: ssh %s -p %s -R 80:localhost:3000", config.Getenv("DOMAIN", "localhost"), config.Getenv("PORT", "2200")))
|
||||||
func (s *session) handleMissingForwardRequest() error {
|
|
||||||
err := s.interaction.Send(fmt.Sprintf("PortRegistry forwarding request not received. Ensure you ran the correct command with -R flag. Example: ssh %s -p %s -R 80:localhost:3000", s.config.Domain(), s.config.SSHPort()))
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
@@ -168,19 +120,24 @@ func (s *session) handleMissingForwardRequest() error {
|
|||||||
log.Printf("failed to close session: %v", err)
|
log.Printf("failed to close session: %v", err)
|
||||||
}
|
}
|
||||||
return fmt.Errorf("no forwarding Request")
|
return fmt.Errorf("no forwarding Request")
|
||||||
}
|
|
||||||
|
|
||||||
func (s *session) shouldRejectUnauthorized() bool {
|
|
||||||
return s.interaction.Mode() == types.InteractiveModeHEADLESS &&
|
|
||||||
s.config.Mode() == types.ServerModeSTANDALONE &&
|
|
||||||
s.lifecycle.User() == "UNAUTHORIZED"
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *session) waitForSessionEnd() error {
|
|
||||||
if err := s.lifecycle.Connection().Wait(); err != nil && !errors.Is(err, io.EOF) && !errors.Is(err, net.ErrClosed) {
|
|
||||||
log.Printf("ssh connection closed with error: %v", err)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (s.interaction.GetMode() == types.HEADLESS && config.Getenv("MODE", "standalone") == "standalone") || s.lifecycle.GetUser() == "UNAUTHORIZED" {
|
||||||
|
if err := tcpipReq.Reply(false, nil); err != nil {
|
||||||
|
log.Printf("cannot reply to tcpip req: %s\n", err)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := s.lifecycle.Close(); err != nil {
|
||||||
|
log.Printf("failed to close session: %v", err)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
s.HandleTCPIPForward(tcpipReq)
|
||||||
|
s.interaction.Start()
|
||||||
|
|
||||||
|
s.lifecycle.GetConnection().Wait()
|
||||||
if err := s.lifecycle.Close(); err != nil {
|
if err := s.lifecycle.Close(); err != nil {
|
||||||
log.Printf("failed to close session: %v", err)
|
log.Printf("failed to close session: %v", err)
|
||||||
return err
|
return err
|
||||||
@@ -188,7 +145,7 @@ func (s *session) waitForSessionEnd() error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *session) waitForTCPIPForward() *ssh.Request {
|
func (s *SSHSession) waitForTCPIPForward() *ssh.Request {
|
||||||
select {
|
select {
|
||||||
case req, ok := <-s.initialReq:
|
case req, ok := <-s.initialReq:
|
||||||
if !ok {
|
if !ok {
|
||||||
@@ -208,214 +165,3 @@ func (s *session) waitForTCPIPForward() *ssh.Request {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *session) handleWindowChange(req *ssh.Request) error {
|
|
||||||
p := req.Payload
|
|
||||||
if len(p) < 16 {
|
|
||||||
log.Println("invalid window-change payload")
|
|
||||||
return req.Reply(false, nil)
|
|
||||||
}
|
|
||||||
|
|
||||||
cols := binary.BigEndian.Uint32(p[0:4])
|
|
||||||
rows := binary.BigEndian.Uint32(p[4:8])
|
|
||||||
|
|
||||||
s.interaction.SetWH(int(cols), int(rows))
|
|
||||||
return req.Reply(true, nil)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *session) HandleGlobalRequest(GlobalRequest <-chan *ssh.Request) error {
|
|
||||||
for req := range GlobalRequest {
|
|
||||||
switch req.Type {
|
|
||||||
case "shell", "pty-req":
|
|
||||||
err := req.Reply(true, nil)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
case "window-change":
|
|
||||||
if err := s.handleWindowChange(req); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
default:
|
|
||||||
log.Println("Unknown request type:", req.Type)
|
|
||||||
err := req.Reply(false, nil)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *session) parseForwardPayload(payloadReader io.Reader) (address string, port uint16, err error) {
|
|
||||||
address, err = readSSHString(payloadReader)
|
|
||||||
if err != nil {
|
|
||||||
return "", 0, err
|
|
||||||
}
|
|
||||||
|
|
||||||
var rawPortToBind uint32
|
|
||||||
if err = binary.Read(payloadReader, binary.BigEndian, &rawPortToBind); err != nil {
|
|
||||||
return "", 0, err
|
|
||||||
}
|
|
||||||
|
|
||||||
if rawPortToBind > 65535 {
|
|
||||||
return "", 0, fmt.Errorf("port is larger than allowed port of 65535")
|
|
||||||
}
|
|
||||||
|
|
||||||
port = uint16(rawPortToBind)
|
|
||||||
if isBlockedPort(port) {
|
|
||||||
return "", 0, fmt.Errorf("port is block")
|
|
||||||
}
|
|
||||||
|
|
||||||
if port == 0 {
|
|
||||||
unassigned, ok := s.lifecycle.PortRegistry().Unassigned()
|
|
||||||
if !ok {
|
|
||||||
return "", 0, fmt.Errorf("no available port")
|
|
||||||
}
|
|
||||||
return address, unassigned, err
|
|
||||||
}
|
|
||||||
|
|
||||||
return address, port, err
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *session) denyForwardingRequest(req *ssh.Request, key *types.SessionKey, listener io.Closer, msg string) error {
|
|
||||||
var errs []error
|
|
||||||
if key != nil {
|
|
||||||
s.registry.Remove(*key)
|
|
||||||
}
|
|
||||||
if listener != nil {
|
|
||||||
if err := listener.Close(); err != nil {
|
|
||||||
errs = append(errs, fmt.Errorf("close listener: %w", err))
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if err := req.Reply(false, nil); err != nil {
|
|
||||||
errs = append(errs, fmt.Errorf("reply request: %w", err))
|
|
||||||
}
|
|
||||||
if err := s.lifecycle.Close(); err != nil {
|
|
||||||
errs = append(errs, fmt.Errorf("close session: %w", err))
|
|
||||||
}
|
|
||||||
errs = append(errs, fmt.Errorf("deny forwarding request: %s", msg))
|
|
||||||
return errors.Join(errs...)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *session) approveForwardingRequest(req *ssh.Request, port uint16) (err error) {
|
|
||||||
buf := new(bytes.Buffer)
|
|
||||||
err = binary.Write(buf, binary.BigEndian, uint32(port))
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
err = req.Reply(true, buf.Bytes())
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *session) finalizeForwarding(req *ssh.Request, portToBind uint16, listener net.Listener, tunnelType types.TunnelType, slug string) error {
|
|
||||||
err := s.approveForwardingRequest(req, portToBind)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
s.forwarder.SetType(tunnelType)
|
|
||||||
s.forwarder.SetForwardedPort(portToBind)
|
|
||||||
s.slug.Set(slug)
|
|
||||||
s.lifecycle.SetStatus(types.SessionStatusRUNNING)
|
|
||||||
|
|
||||||
if listener != nil {
|
|
||||||
s.forwarder.SetListener(listener)
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *session) HandleTCPIPForward(req *ssh.Request) error {
|
|
||||||
reader := bytes.NewReader(req.Payload)
|
|
||||||
|
|
||||||
address, port, err := s.parseForwardPayload(reader)
|
|
||||||
if err != nil {
|
|
||||||
return s.denyForwardingRequest(req, nil, nil, fmt.Sprintf("cannot parse forwarded payload: %s", err.Error()))
|
|
||||||
}
|
|
||||||
|
|
||||||
switch port {
|
|
||||||
case 80, 443:
|
|
||||||
return s.HandleHTTPForward(req, port)
|
|
||||||
default:
|
|
||||||
return s.HandleTCPForward(req, address, port)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *session) HandleHTTPForward(req *ssh.Request, portToBind uint16) error {
|
|
||||||
randomString, err := random.GenerateRandomString(20)
|
|
||||||
if err != nil {
|
|
||||||
return s.denyForwardingRequest(req, nil, nil, fmt.Sprintf("Failed to create slug: %s", err))
|
|
||||||
}
|
|
||||||
key := types.SessionKey{Id: randomString, Type: types.TunnelTypeHTTP}
|
|
||||||
if !s.registry.Register(key, s) {
|
|
||||||
return s.denyForwardingRequest(req, nil, nil, fmt.Sprintf("Failed to register client with slug: %s", randomString))
|
|
||||||
}
|
|
||||||
|
|
||||||
err = s.finalizeForwarding(req, portToBind, nil, types.TunnelTypeHTTP, key.Id)
|
|
||||||
if err != nil {
|
|
||||||
return s.denyForwardingRequest(req, &key, nil, fmt.Sprintf("Failed to finalize forwarding: %s", err))
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *session) HandleTCPForward(req *ssh.Request, addr string, portToBind uint16) error {
|
|
||||||
if claimed := s.lifecycle.PortRegistry().Claim(portToBind); !claimed {
|
|
||||||
return s.denyForwardingRequest(req, nil, nil, fmt.Sprintf("PortRegistry %d is already in use or restricted", portToBind))
|
|
||||||
}
|
|
||||||
|
|
||||||
tcpServer := transport.NewTCPServer(portToBind, s.forwarder)
|
|
||||||
listener, err := tcpServer.Listen()
|
|
||||||
if err != nil {
|
|
||||||
return s.denyForwardingRequest(req, nil, listener, fmt.Sprintf("PortRegistry %d is already in use or restricted", portToBind))
|
|
||||||
}
|
|
||||||
|
|
||||||
key := types.SessionKey{Id: fmt.Sprintf("%d", portToBind), Type: types.TunnelTypeTCP}
|
|
||||||
if !s.registry.Register(key, s) {
|
|
||||||
return s.denyForwardingRequest(req, nil, listener, fmt.Sprintf("Failed to register TunnelTypeTCP client with id: %s", key.Id))
|
|
||||||
}
|
|
||||||
|
|
||||||
err = s.finalizeForwarding(req, portToBind, listener, types.TunnelTypeTCP, key.Id)
|
|
||||||
if err != nil {
|
|
||||||
return s.denyForwardingRequest(req, &key, listener, fmt.Sprintf("Failed to finalize forwarding: %s", err))
|
|
||||||
}
|
|
||||||
|
|
||||||
go func() {
|
|
||||||
err = tcpServer.Serve(listener)
|
|
||||||
if err != nil {
|
|
||||||
log.Printf("Failed serving tcp server: %s\n", err)
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func readSSHString(reader io.Reader) (string, error) {
|
|
||||||
var length uint32
|
|
||||||
if err := binary.Read(reader, binary.BigEndian, &length); err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
|
||||||
strBytes := make([]byte, length)
|
|
||||||
if _, err := reader.Read(strBytes); err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
|
||||||
return string(strBytes), nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func isBlockedPort(port uint16) bool {
|
|
||||||
if port == 80 || port == 443 {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
if port < 1024 && port != 0 {
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
for _, p := range blockedReservedPorts {
|
|
||||||
if p == port {
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
|||||||
@@ -1,24 +1,24 @@
|
|||||||
package slug
|
package slug
|
||||||
|
|
||||||
type Slug interface {
|
type Manager interface {
|
||||||
String() string
|
Get() string
|
||||||
Set(slug string)
|
Set(slug string)
|
||||||
}
|
}
|
||||||
|
|
||||||
type slug struct {
|
type manager struct {
|
||||||
slug string
|
slug string
|
||||||
}
|
}
|
||||||
|
|
||||||
func New() Slug {
|
func NewManager() Manager {
|
||||||
return &slug{
|
return &manager{
|
||||||
slug: "",
|
slug: "",
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *slug) String() string {
|
func (s *manager) Get() string {
|
||||||
return s.slug
|
return s.slug
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *slug) Set(slug string) {
|
func (s *manager) Set(slug string) {
|
||||||
s.slug = slug
|
s.slug = slug
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1 +0,0 @@
|
|||||||
sonar.projectKey=tunnel-please
|
|
||||||
+11
-27
@@ -1,34 +1,26 @@
|
|||||||
package types
|
package types
|
||||||
|
|
||||||
import "time"
|
type Status string
|
||||||
|
|
||||||
type SessionStatus int
|
|
||||||
|
|
||||||
const (
|
const (
|
||||||
SessionStatusINITIALIZING SessionStatus = iota
|
INITIALIZING Status = "INITIALIZING"
|
||||||
SessionStatusRUNNING
|
RUNNING Status = "RUNNING"
|
||||||
|
SETUP Status = "SETUP"
|
||||||
)
|
)
|
||||||
|
|
||||||
type InteractiveMode int
|
type Mode string
|
||||||
|
|
||||||
const (
|
const (
|
||||||
InteractiveModeINTERACTIVE InteractiveMode = iota + 1
|
INTERACTIVE Mode = "INTERACTIVE"
|
||||||
InteractiveModeHEADLESS
|
HEADLESS Mode = "HEADLESS"
|
||||||
)
|
)
|
||||||
|
|
||||||
type TunnelType int
|
type TunnelType string
|
||||||
|
|
||||||
const (
|
const (
|
||||||
TunnelTypeUNKNOWN TunnelType = iota
|
UNKNOWN TunnelType = "UNKNOWN"
|
||||||
TunnelTypeHTTP
|
HTTP TunnelType = "HTTP"
|
||||||
TunnelTypeTCP
|
TCP TunnelType = "TCP"
|
||||||
)
|
|
||||||
|
|
||||||
type ServerMode int
|
|
||||||
|
|
||||||
const (
|
|
||||||
ServerModeSTANDALONE = iota + 1
|
|
||||||
ServerModeNODE
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type SessionKey struct {
|
type SessionKey struct {
|
||||||
@@ -36,14 +28,6 @@ type SessionKey struct {
|
|||||||
Type TunnelType
|
Type TunnelType
|
||||||
}
|
}
|
||||||
|
|
||||||
type Detail struct {
|
|
||||||
ForwardingType string `json:"forwarding_type,omitempty"`
|
|
||||||
Slug string `json:"slug,omitempty"`
|
|
||||||
UserID string `json:"user_id,omitempty"`
|
|
||||||
Active bool `json:"active,omitempty"`
|
|
||||||
StartedAt time.Time `json:"started_at,omitempty"`
|
|
||||||
}
|
|
||||||
|
|
||||||
var BadGatewayResponse = []byte("HTTP/1.1 502 Bad Gateway\r\n" +
|
var BadGatewayResponse = []byte("HTTP/1.1 502 Bad Gateway\r\n" +
|
||||||
"Content-Length: 11\r\n" +
|
"Content-Length: 11\r\n" +
|
||||||
"Content-Type: text/plain\r\n\r\n" +
|
"Content-Type: text/plain\r\n\r\n" +
|
||||||
|
|||||||
Reference in New Issue
Block a user