route/lib/tun2/server.go

502 lines
9.3 KiB
Go
Raw Normal View History

package tun2
import (
"bufio"
2017-03-26 20:38:05 +00:00
"context"
"crypto/tls"
"encoding/json"
"errors"
"fmt"
2017-03-27 04:56:54 +00:00
"io/ioutil"
"math/rand"
"net"
"net/http"
2017-03-27 04:56:54 +00:00
"strings"
"sync"
2017-03-26 22:14:13 +00:00
"time"
"git.xeserv.us/xena/route/database"
"github.com/Xe/ln"
failure "github.com/dgryski/go-failure"
"github.com/mtneug/pkg/ulid"
2017-03-27 04:56:54 +00:00
cmap "github.com/streamrail/concurrent-map"
kcp "github.com/xtaci/kcp-go"
"github.com/xtaci/smux"
)
type ServerConfig struct {
TCPAddr string
KCPAddr string
TLSConfig *tls.Config
SmuxConf *smux.Config
Storage Storage
}
type Storage interface {
GetRouteForHost(name string) (*database.Route, error)
//ValidateToken(token string) (username string, ok bool, err error) // XXX RIP implement when users are implemented
}
type Server struct {
cfg *ServerConfig
connlock sync.Mutex
conns map[net.Conn]*Connection
2017-03-27 04:56:54 +00:00
domains cmap.ConcurrentMap
}
type Connection struct {
id string
conn net.Conn
isKCP bool
session *smux.Session
controlStream *smux.Stream
user string
domain string
2017-03-26 20:38:05 +00:00
cancel context.CancelFunc
detector *failure.Detector
}
2017-03-26 22:28:29 +00:00
func (c *Connection) F() ln.F {
2017-03-26 22:26:59 +00:00
return map[string]interface{}{
"id": c.id,
"remote": c.conn.RemoteAddr(),
"local": c.conn.LocalAddr(),
"isKCP": c.isKCP,
"user": c.user,
"domain": c.domain,
}
}
func NewServer(cfg *ServerConfig) (*Server, error) {
if cfg == nil {
return nil, errors.New("tun2: config must be specified")
}
if cfg.SmuxConf == nil {
cfg.SmuxConf = smux.DefaultConfig()
}
server := &Server{
cfg: cfg,
conns: map[net.Conn]*Connection{},
2017-03-27 04:56:54 +00:00
domains: cmap.New(),
}
return server, nil
}
func (s *Server) ListenAndServe() error {
ln.Log(ln.F{
"action": "listen_and_serve_called",
})
if s.cfg.TCPAddr != "" {
go func() {
l, err := tls.Listen("tcp", s.cfg.TCPAddr, s.cfg.TLSConfig)
if err != nil {
panic(err)
}
ln.Log(ln.F{
"action": "tcp+tls_listening",
"addr": l.Addr(),
})
for {
conn, err := l.Accept()
if err != nil {
ln.Error(err, ln.F{"kind": "tcp", "addr": l.Addr().String()})
continue
}
2017-03-26 20:23:52 +00:00
ln.Log(ln.F{
"action": "new_client",
"kcp": false,
"addr": conn.RemoteAddr(),
})
go s.HandleConn(conn, false)
}
}()
}
if s.cfg.KCPAddr != "" {
go func() {
l, err := kcp.Listen(s.cfg.KCPAddr)
if err != nil {
panic(err)
}
ln.Log(ln.F{
"action": "kcp+tls_listening",
"addr": l.Addr(),
})
for {
conn, err := l.Accept()
if err != nil {
ln.Error(err, ln.F{"kind": "kcp", "addr": l.Addr().String()})
}
2017-03-26 20:23:52 +00:00
ln.Log(ln.F{
"action": "new_client",
"kcp": true,
"addr": conn.RemoteAddr(),
})
tc := tls.Server(conn, s.cfg.TLSConfig)
go s.HandleConn(tc, true)
}
}()
}
2017-03-26 22:14:13 +00:00
go func() {
for {
time.Sleep(5 * time.Second)
now := time.Now()
s.connlock.Lock()
for _, c := range s.conns {
failureChance := c.detector.Phi(now)
ln.Log(c.F(), ln.F{
"action": "phi_failure_detection",
"value": failureChance,
})
}
2017-04-05 21:33:54 +00:00
s.connlock.Unlock()
2017-03-27 05:19:43 +00:00
}
}()
2017-03-26 22:14:13 +00:00
2017-03-27 05:19:43 +00:00
return nil
}
2017-03-26 23:16:39 +00:00
// Ping ends a "ping" to the client. If the client doesn't respond or the connection
// dies, then the connection needs to be cleaned up.
func (c *Connection) Ping() error {
req, err := http.NewRequest("GET", "http://backend/health", nil)
if err != nil {
panic(err)
}
2017-03-26 23:16:39 +00:00
stream, err := c.OpenStream()
if err != nil {
ln.Error(err, c.F())
defer c.cancel()
return err
}
defer stream.Close()
2017-03-26 23:16:39 +00:00
stream.SetWriteDeadline(time.Now().Add(time.Second))
err = req.Write(stream)
if err != nil {
ln.Error(err, c.F())
defer c.cancel()
return err
}
2017-03-26 23:16:39 +00:00
stream.SetReadDeadline(time.Now().Add(5 * time.Second))
_, err = stream.Read(make([]byte, 30))
if err != nil {
ln.Error(err, c.F())
defer c.cancel()
return err
}
2017-03-26 22:14:13 +00:00
c.detector.Ping(time.Now())
2017-03-26 22:14:13 +00:00
return nil
}
2017-03-27 05:19:43 +00:00
// OpenStream creates a new stream (connection) to the backend server.
func (c *Connection) OpenStream() (net.Conn, error) {
err := c.conn.SetDeadline(time.Now().Add(time.Second))
if err != nil {
ln.Error(err, c.F())
return nil, err
}
stream, err := c.session.OpenStream()
if err != nil {
ln.Error(err, c.F())
return nil, err
2017-03-27 05:19:43 +00:00
}
return stream, c.conn.SetDeadline(time.Time{})
}
func (s *Server) HandleConn(c net.Conn, isKCP bool) {
2017-03-26 20:38:05 +00:00
ctx, cancel := context.WithCancel(context.Background())
defer cancel()
session, err := smux.Server(c, s.cfg.SmuxConf)
if err != nil {
ln.Error(err, ln.F{
"action": "session_failure",
"local": c.LocalAddr().String(),
"remote": c.RemoteAddr().String(),
})
c.Close()
return
}
controlStream, err := session.OpenStream()
if err != nil {
ln.Error(err, ln.F{
2017-03-26 22:19:33 +00:00
"action": "control_stream_failure",
"local": c.LocalAddr().String(),
"remote": c.RemoteAddr().String(),
})
session.Close()
c.Close()
return
}
csd := json.NewDecoder(controlStream)
auth := &Auth{}
err = csd.Decode(auth)
if err != nil {
ln.Error(err, ln.F{
"action": "control_stream_auth_decoding_failure",
"local": c.LocalAddr().String(),
"remote": c.RemoteAddr().String(),
})
controlStream.Close()
session.Close()
c.Close()
return
}
route, err := s.cfg.Storage.GetRouteForHost(auth.Domain)
if err != nil {
ln.Error(err, ln.F{
"action": "nosuch_domain",
"local": c.LocalAddr().String(),
"remote": c.RemoteAddr().String(),
})
controlStream.Close()
session.Close()
c.Close()
return
}
if route.Token != auth.Token {
ln.Error(err, ln.F{
"action": "bad_token",
"local": c.LocalAddr().String(),
"remote": c.RemoteAddr().String(),
})
fmt.Fprintln(controlStream, "bad token")
controlStream.Close()
session.Close()
c.Close()
return
}
connection := &Connection{
id: ulid.New().String(),
conn: c,
isKCP: isKCP,
session: session,
user: defaultUser, // XXX RIP replace this with the actual token user once users are implemented
domain: auth.Domain,
cancel: cancel,
detector: failure.New(15, 1),
}
2017-03-26 20:18:58 +00:00
ln.Log(ln.F{
"action": "backend_connected",
2017-03-26 22:30:19 +00:00
}, connection.F())
2017-03-26 20:18:58 +00:00
s.connlock.Lock()
s.conns[c] = connection
s.connlock.Unlock()
2017-03-27 04:56:54 +00:00
var conns []*Connection
val, ok := s.domains.Get(auth.Domain)
if ok {
conns, ok = val.([]*Connection)
if !ok {
conns = nil
s.domains.Remove(auth.Domain)
}
}
conns = append(conns, connection)
s.domains.Set(auth.Domain, conns)
2017-03-26 20:38:05 +00:00
ticker := time.NewTicker(5 * time.Second)
defer ticker.Stop()
2017-03-26 20:38:05 +00:00
select {
case <-ticker.C:
err := connection.Ping()
if err != nil {
cancel()
}
2017-03-26 20:38:05 +00:00
case <-ctx.Done():
s.connlock.Lock()
delete(s.conns, c)
s.connlock.Unlock()
2017-03-27 04:56:54 +00:00
var conns []*Connection
val, ok := s.domains.Get(auth.Domain)
if ok {
conns, ok = val.([]*Connection)
if !ok {
ln.Error(err, connection.F(), ln.F{
"action": "looking_up_for_disconnect_removal",
})
return
}
}
2017-03-26 20:38:05 +00:00
2017-03-27 04:56:54 +00:00
for i, cntn := range conns {
2017-03-26 20:38:05 +00:00
if cntn.id == connection.id {
2017-03-27 04:56:54 +00:00
conns[i] = conns[len(conns)-1]
conns = conns[:len(conns)-1]
2017-03-26 20:38:05 +00:00
}
}
2017-03-27 04:56:54 +00:00
if len(conns) != 0 {
s.domains.Set(auth.Domain, conns)
} else {
s.domains.Remove(auth.Domain)
}
2017-03-26 20:38:05 +00:00
2017-03-26 23:21:02 +00:00
ln.Log(connection.F(), ln.F{
2017-03-26 20:38:05 +00:00
"action": "client_disconnecting",
2017-03-26 23:21:02 +00:00
})
2017-03-26 20:38:05 +00:00
2017-03-26 20:47:42 +00:00
controlStream.Close()
session.Close()
c.Close()
2017-03-26 20:38:05 +00:00
return
}
}
func (s *Server) RoundTrip(req *http.Request) (*http.Response, error) {
2017-03-27 04:56:54 +00:00
var conns []*Connection
val, ok := s.domains.Get(req.Host)
if ok {
conns, ok = val.([]*Connection)
2017-03-27 05:03:06 +00:00
if !ok {
2017-03-27 04:56:54 +00:00
ln.Error(errors.New("no backend connected"), ln.F{
"action": "no_backend_connected",
"remote": req.RemoteAddr,
"host": req.Host,
"uri": req.RequestURI,
})
resp := &http.Response{
StatusCode: http.StatusBadGateway,
Body: ioutil.NopCloser(strings.NewReader("no such domain")),
ContentLength: 14,
Close: true,
Request: req,
}
2017-03-27 05:19:43 +00:00
return resp, errors.New("no backend connected")
2017-03-27 04:56:54 +00:00
}
}
2017-03-27 05:03:06 +00:00
if len(conns) == 0 {
2017-03-27 05:50:45 +00:00
ln.Error(errors.New("no backend connected"), ln.F{
"action": "no_backend_connected",
"remote": req.RemoteAddr,
"host": req.Host,
"uri": req.RequestURI,
})
2017-03-27 05:03:06 +00:00
return nil, errors.New("no backend connected")
}
c := conns[rand.Intn(len(conns))]
c.conn.SetDeadline(time.Now().Add(time.Second))
stream, err := c.session.OpenStream()
if err != nil {
ln.Error(err, ln.F{
"action": "opening_session_stream",
"remote_addr": req.RemoteAddr,
"host": req.Host,
"uri": req.RequestURI,
2017-03-26 22:30:19 +00:00
}, c.F())
2017-03-26 20:47:42 +00:00
c.cancel()
2017-03-26 20:52:53 +00:00
return s.RoundTrip(req)
}
defer stream.Close()
c.conn.SetDeadline(time.Time{})
err = req.Write(stream)
if err != nil {
ln.Error(err, ln.F{
"action": "request_writing",
"remote_addr": req.RemoteAddr,
"host": req.Host,
"uri": req.RequestURI,
2017-03-26 22:30:19 +00:00
}, c.F())
2017-03-26 20:47:42 +00:00
c.cancel()
2017-03-26 20:52:53 +00:00
return s.RoundTrip(req)
}
buf := bufio.NewReader(stream)
resp, err := http.ReadResponse(buf, req)
if err != nil {
ln.Error(err, ln.F{
"action": "response_reading",
"remote_addr": req.RemoteAddr,
"host": req.Host,
"uri": req.RequestURI,
2017-03-26 22:30:19 +00:00
}, c.F())
2017-03-26 20:47:42 +00:00
c.cancel()
return nil, err
}
2017-03-26 22:36:58 +00:00
ln.Log(c.F(), ln.F{
"action": "http_traffic",
"remote_addr": req.RemoteAddr,
"host": req.Host,
"uri": req.RequestURI,
})
return resp, nil
}
type Auth struct {
Token string `json:"token"`
Domain string `json:"domain"`
}
const defaultUser = "Cadey"