2017-03-26 19:50:51 +00:00
|
|
|
package tun2
|
|
|
|
|
|
|
|
import (
|
2017-03-26 20:38:05 +00:00
|
|
|
"context"
|
2017-03-26 19:50:51 +00:00
|
|
|
"crypto/tls"
|
|
|
|
"encoding/json"
|
|
|
|
"errors"
|
|
|
|
"math/rand"
|
|
|
|
"net"
|
|
|
|
"net/http"
|
|
|
|
"sync"
|
2017-03-26 22:14:13 +00:00
|
|
|
"time"
|
2017-03-26 19:50:51 +00:00
|
|
|
|
|
|
|
"github.com/Xe/ln"
|
2017-04-05 21:31:15 +00:00
|
|
|
failure "github.com/dgryski/go-failure"
|
2017-03-26 19:50:51 +00:00
|
|
|
"github.com/mtneug/pkg/ulid"
|
2017-03-27 04:56:54 +00:00
|
|
|
cmap "github.com/streamrail/concurrent-map"
|
2017-03-26 19:50:51 +00:00
|
|
|
kcp "github.com/xtaci/kcp-go"
|
|
|
|
"github.com/xtaci/smux"
|
|
|
|
)
|
|
|
|
|
2017-04-28 22:23:26 +00:00
|
|
|
// Error values
|
|
|
|
var (
|
|
|
|
ErrNoSuchBackend = errors.New("tun2: there is no such backend")
|
|
|
|
ErrAuthMismatch = errors.New("tun2: authenication doesn't match database records")
|
|
|
|
ErrCantRemoveWhatDoesntExist = errors.New("tun2: this connection does not exist, cannot remove it")
|
|
|
|
)
|
|
|
|
|
|
|
|
// ServerConfig ...
|
2017-03-26 19:50:51 +00:00
|
|
|
type ServerConfig struct {
|
|
|
|
TCPAddr string
|
|
|
|
KCPAddr string
|
|
|
|
TLSConfig *tls.Config
|
|
|
|
|
|
|
|
SmuxConf *smux.Config
|
|
|
|
Storage Storage
|
|
|
|
}
|
|
|
|
|
2017-04-28 22:23:26 +00:00
|
|
|
// Storage is the minimal subset of features that tun2's Server needs out of a
|
|
|
|
// persistence layer.
|
2017-03-26 19:50:51 +00:00
|
|
|
type Storage interface {
|
2017-04-28 22:23:26 +00:00
|
|
|
HasToken(token string) (user string, scopes []string, err error)
|
|
|
|
HasRoute(domain string) (user string, err error)
|
2017-03-26 19:50:51 +00:00
|
|
|
}
|
|
|
|
|
2017-04-28 22:23:26 +00:00
|
|
|
// Server routes frontend HTTP traffic to backend TCP traffic.
|
2017-03-26 19:50:51 +00:00
|
|
|
type Server struct {
|
|
|
|
cfg *ServerConfig
|
|
|
|
|
|
|
|
connlock sync.Mutex
|
|
|
|
conns map[net.Conn]*Connection
|
|
|
|
|
2017-03-27 04:56:54 +00:00
|
|
|
domains cmap.ConcurrentMap
|
2017-03-26 19:50:51 +00:00
|
|
|
}
|
|
|
|
|
2017-04-28 22:23:26 +00:00
|
|
|
// NewServer creates a new Server instance with a given config, acquiring all
|
|
|
|
// relevant resources.
|
2017-03-26 19:50:51 +00:00
|
|
|
func NewServer(cfg *ServerConfig) (*Server, error) {
|
|
|
|
if cfg == nil {
|
|
|
|
return nil, errors.New("tun2: config must be specified")
|
|
|
|
}
|
|
|
|
|
|
|
|
if cfg.SmuxConf == nil {
|
|
|
|
cfg.SmuxConf = smux.DefaultConfig()
|
|
|
|
}
|
|
|
|
|
2017-04-05 22:54:58 +00:00
|
|
|
cfg.SmuxConf.KeepAliveInterval = time.Second
|
|
|
|
cfg.SmuxConf.KeepAliveTimeout = 15 * time.Second
|
|
|
|
|
2017-03-26 19:50:51 +00:00
|
|
|
server := &Server{
|
|
|
|
cfg: cfg,
|
|
|
|
|
|
|
|
conns: map[net.Conn]*Connection{},
|
2017-03-27 04:56:54 +00:00
|
|
|
domains: cmap.New(),
|
2017-03-26 19:50:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return server, nil
|
|
|
|
}
|
|
|
|
|
2017-04-28 22:23:26 +00:00
|
|
|
// ListenAndServe starts the backend TCP/KCP listeners and relays backend
|
|
|
|
// traffic to and from them.
|
2017-03-26 19:50:51 +00:00
|
|
|
func (s *Server) ListenAndServe() error {
|
2017-03-26 20:15:42 +00:00
|
|
|
ln.Log(ln.F{
|
|
|
|
"action": "listen_and_serve_called",
|
|
|
|
})
|
|
|
|
|
2017-03-26 19:50:51 +00:00
|
|
|
if s.cfg.TCPAddr != "" {
|
|
|
|
go func() {
|
|
|
|
l, err := tls.Listen("tcp", s.cfg.TCPAddr, s.cfg.TLSConfig)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
2017-03-26 20:14:05 +00:00
|
|
|
ln.Log(ln.F{
|
|
|
|
"action": "tcp+tls_listening",
|
|
|
|
"addr": l.Addr(),
|
|
|
|
})
|
|
|
|
|
2017-03-26 19:50:51 +00:00
|
|
|
for {
|
|
|
|
conn, err := l.Accept()
|
|
|
|
if err != nil {
|
|
|
|
ln.Error(err, ln.F{"kind": "tcp", "addr": l.Addr().String()})
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2017-03-26 20:23:52 +00:00
|
|
|
ln.Log(ln.F{
|
|
|
|
"action": "new_client",
|
|
|
|
"kcp": false,
|
|
|
|
"addr": conn.RemoteAddr(),
|
|
|
|
})
|
|
|
|
|
2017-03-26 19:50:51 +00:00
|
|
|
go s.HandleConn(conn, false)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
|
|
|
if s.cfg.KCPAddr != "" {
|
|
|
|
go func() {
|
|
|
|
l, err := kcp.Listen(s.cfg.KCPAddr)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
2017-03-26 20:14:05 +00:00
|
|
|
ln.Log(ln.F{
|
|
|
|
"action": "kcp+tls_listening",
|
|
|
|
"addr": l.Addr(),
|
|
|
|
})
|
|
|
|
|
2017-03-26 19:50:51 +00:00
|
|
|
for {
|
|
|
|
conn, err := l.Accept()
|
|
|
|
if err != nil {
|
|
|
|
ln.Error(err, ln.F{"kind": "kcp", "addr": l.Addr().String()})
|
|
|
|
}
|
|
|
|
|
2017-03-26 20:23:52 +00:00
|
|
|
ln.Log(ln.F{
|
|
|
|
"action": "new_client",
|
|
|
|
"kcp": true,
|
|
|
|
"addr": conn.RemoteAddr(),
|
|
|
|
})
|
|
|
|
|
2017-03-26 19:50:51 +00:00
|
|
|
tc := tls.Server(conn, s.cfg.TLSConfig)
|
|
|
|
|
|
|
|
go s.HandleConn(tc, true)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
2017-04-28 22:23:26 +00:00
|
|
|
// XXX experimental, might get rid of this inside this process
|
2017-03-26 22:14:13 +00:00
|
|
|
go func() {
|
|
|
|
for {
|
2017-04-05 22:26:44 +00:00
|
|
|
time.Sleep(time.Second)
|
2017-04-05 21:31:15 +00:00
|
|
|
|
|
|
|
now := time.Now()
|
|
|
|
|
|
|
|
s.connlock.Lock()
|
|
|
|
for _, c := range s.conns {
|
|
|
|
failureChance := c.detector.Phi(now)
|
|
|
|
|
2017-09-30 15:39:30 +00:00
|
|
|
if failureChance > 0.8 {
|
2017-04-05 22:23:13 +00:00
|
|
|
ln.Log(c.F(), ln.F{
|
|
|
|
"action": "phi_failure_detection",
|
|
|
|
"value": failureChance,
|
|
|
|
})
|
|
|
|
}
|
2017-04-05 21:31:15 +00:00
|
|
|
}
|
2017-04-05 21:33:54 +00:00
|
|
|
s.connlock.Unlock()
|
2017-03-27 05:19:43 +00:00
|
|
|
}
|
|
|
|
}()
|
2017-03-26 22:14:13 +00:00
|
|
|
|
2017-03-27 05:19:43 +00:00
|
|
|
return nil
|
|
|
|
}
|
2017-03-26 23:16:39 +00:00
|
|
|
|
2017-04-28 22:23:26 +00:00
|
|
|
// HandleConn starts up the needed mechanisms to relay HTTP traffic to/from
|
|
|
|
// the currently connected backend.
|
2017-03-26 19:50:51 +00:00
|
|
|
func (s *Server) HandleConn(c net.Conn, isKCP bool) {
|
2017-04-28 22:23:26 +00:00
|
|
|
// XXX TODO clean this up it's really ugly.
|
|
|
|
defer c.Close()
|
|
|
|
|
2017-03-26 20:38:05 +00:00
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
defer cancel()
|
|
|
|
|
2017-03-26 19:50:51 +00:00
|
|
|
session, err := smux.Server(c, s.cfg.SmuxConf)
|
|
|
|
if err != nil {
|
|
|
|
ln.Error(err, ln.F{
|
|
|
|
"action": "session_failure",
|
|
|
|
"local": c.LocalAddr().String(),
|
|
|
|
"remote": c.RemoteAddr().String(),
|
|
|
|
})
|
|
|
|
|
|
|
|
c.Close()
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
2017-04-28 22:23:26 +00:00
|
|
|
defer session.Close()
|
2017-03-26 19:50:51 +00:00
|
|
|
|
|
|
|
controlStream, err := session.OpenStream()
|
|
|
|
if err != nil {
|
|
|
|
ln.Error(err, ln.F{
|
2017-03-26 22:19:33 +00:00
|
|
|
"action": "control_stream_failure",
|
2017-03-26 19:50:51 +00:00
|
|
|
"local": c.LocalAddr().String(),
|
|
|
|
"remote": c.RemoteAddr().String(),
|
|
|
|
})
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
2017-04-28 22:23:26 +00:00
|
|
|
defer controlStream.Close()
|
2017-03-26 19:50:51 +00:00
|
|
|
|
|
|
|
csd := json.NewDecoder(controlStream)
|
|
|
|
auth := &Auth{}
|
|
|
|
err = csd.Decode(auth)
|
|
|
|
if err != nil {
|
|
|
|
ln.Error(err, ln.F{
|
|
|
|
"action": "control_stream_auth_decoding_failure",
|
|
|
|
"local": c.LocalAddr().String(),
|
|
|
|
"remote": c.RemoteAddr().String(),
|
|
|
|
})
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-04-28 22:23:26 +00:00
|
|
|
routeUser, err := s.cfg.Storage.HasRoute(auth.Domain)
|
2017-03-26 19:50:51 +00:00
|
|
|
if err != nil {
|
|
|
|
ln.Error(err, ln.F{
|
|
|
|
"action": "nosuch_domain",
|
|
|
|
"local": c.LocalAddr().String(),
|
|
|
|
"remote": c.RemoteAddr().String(),
|
|
|
|
})
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-04-28 22:23:26 +00:00
|
|
|
tokenUser, scopes, err := s.cfg.Storage.HasToken(auth.Token)
|
|
|
|
if err != nil {
|
2017-03-26 19:50:51 +00:00
|
|
|
ln.Error(err, ln.F{
|
2017-04-28 22:23:26 +00:00
|
|
|
"action": "nosuch_token",
|
2017-03-26 19:50:51 +00:00
|
|
|
"local": c.LocalAddr().String(),
|
|
|
|
"remote": c.RemoteAddr().String(),
|
|
|
|
})
|
|
|
|
|
2017-04-28 22:23:26 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
ok := false
|
|
|
|
for _, sc := range scopes {
|
|
|
|
if sc == "connect" {
|
|
|
|
ok = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
2017-03-26 19:50:51 +00:00
|
|
|
|
2017-04-28 22:23:26 +00:00
|
|
|
if !ok {
|
|
|
|
ln.Error(ErrAuthMismatch, ln.F{
|
|
|
|
"action": "token_not_authorized",
|
|
|
|
"local": c.LocalAddr().String(),
|
|
|
|
"remote": c.RemoteAddr().String(),
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
if routeUser != tokenUser {
|
|
|
|
ln.Error(ErrAuthMismatch, ln.F{
|
|
|
|
"action": "auth_mismatch",
|
|
|
|
"local": c.LocalAddr().String(),
|
|
|
|
"remote": c.RemoteAddr().String(),
|
|
|
|
})
|
2017-03-26 19:50:51 +00:00
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
connection := &Connection{
|
2017-04-05 21:31:15 +00:00
|
|
|
id: ulid.New().String(),
|
|
|
|
conn: c,
|
|
|
|
isKCP: isKCP,
|
|
|
|
session: session,
|
2017-04-28 22:23:26 +00:00
|
|
|
user: tokenUser,
|
2017-04-05 21:31:15 +00:00
|
|
|
domain: auth.Domain,
|
|
|
|
cancel: cancel,
|
2017-04-05 21:40:37 +00:00
|
|
|
detector: failure.New(15, 1),
|
2017-04-06 04:44:12 +00:00
|
|
|
Auth: auth,
|
2017-03-26 19:50:51 +00:00
|
|
|
}
|
|
|
|
|
2017-03-26 20:18:58 +00:00
|
|
|
ln.Log(ln.F{
|
|
|
|
"action": "backend_connected",
|
2017-03-26 22:30:19 +00:00
|
|
|
}, connection.F())
|
2017-03-26 20:18:58 +00:00
|
|
|
|
2017-03-26 19:50:51 +00:00
|
|
|
s.connlock.Lock()
|
|
|
|
s.conns[c] = connection
|
|
|
|
s.connlock.Unlock()
|
|
|
|
|
2017-03-27 04:56:54 +00:00
|
|
|
var conns []*Connection
|
|
|
|
|
|
|
|
val, ok := s.domains.Get(auth.Domain)
|
|
|
|
if ok {
|
|
|
|
conns, ok = val.([]*Connection)
|
|
|
|
if !ok {
|
|
|
|
conns = nil
|
|
|
|
|
|
|
|
s.domains.Remove(auth.Domain)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
conns = append(conns, connection)
|
|
|
|
|
|
|
|
s.domains.Set(auth.Domain, conns)
|
2017-03-26 20:38:05 +00:00
|
|
|
|
2017-04-05 21:31:15 +00:00
|
|
|
ticker := time.NewTicker(5 * time.Second)
|
|
|
|
defer ticker.Stop()
|
|
|
|
|
2017-04-05 21:48:08 +00:00
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-ticker.C:
|
|
|
|
err := connection.Ping()
|
|
|
|
if err != nil {
|
|
|
|
cancel()
|
2017-03-27 04:56:54 +00:00
|
|
|
}
|
2017-04-05 21:48:08 +00:00
|
|
|
case <-ctx.Done():
|
2017-04-06 04:44:12 +00:00
|
|
|
s.RemoveConn(connection)
|
2017-04-05 22:04:02 +00:00
|
|
|
connection.Close()
|
2017-03-26 20:38:05 +00:00
|
|
|
|
2017-04-05 22:04:02 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2017-03-26 20:38:05 +00:00
|
|
|
|
2017-04-28 22:23:26 +00:00
|
|
|
// RemoveConn removes a connection.
|
2017-04-06 04:44:12 +00:00
|
|
|
func (s *Server) RemoveConn(connection *Connection) {
|
2017-04-05 22:04:02 +00:00
|
|
|
s.connlock.Lock()
|
|
|
|
delete(s.conns, connection.conn)
|
|
|
|
s.connlock.Unlock()
|
2017-03-26 20:38:05 +00:00
|
|
|
|
2017-04-06 04:44:12 +00:00
|
|
|
auth := connection.Auth
|
|
|
|
|
2017-04-05 22:04:02 +00:00
|
|
|
var conns []*Connection
|
2017-03-26 20:38:05 +00:00
|
|
|
|
2017-04-05 22:04:02 +00:00
|
|
|
val, ok := s.domains.Get(auth.Domain)
|
|
|
|
if ok {
|
|
|
|
conns, ok = val.([]*Connection)
|
|
|
|
if !ok {
|
2017-04-28 22:23:26 +00:00
|
|
|
ln.Error(ErrCantRemoveWhatDoesntExist, connection.F(), ln.F{
|
2017-04-05 22:04:02 +00:00
|
|
|
"action": "looking_up_for_disconnect_removal",
|
2017-04-05 21:48:08 +00:00
|
|
|
})
|
|
|
|
return
|
|
|
|
}
|
2017-03-26 20:38:05 +00:00
|
|
|
}
|
2017-04-05 22:04:02 +00:00
|
|
|
|
|
|
|
for i, cntn := range conns {
|
|
|
|
if cntn.id == connection.id {
|
|
|
|
conns[i] = conns[len(conns)-1]
|
|
|
|
conns = conns[:len(conns)-1]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(conns) != 0 {
|
|
|
|
s.domains.Set(auth.Domain, conns)
|
|
|
|
} else {
|
|
|
|
s.domains.Remove(auth.Domain)
|
|
|
|
}
|
|
|
|
|
|
|
|
ln.Log(connection.F(), ln.F{
|
|
|
|
"action": "client_disconnecting",
|
|
|
|
})
|
2017-03-26 19:50:51 +00:00
|
|
|
}
|
|
|
|
|
2017-04-28 22:23:26 +00:00
|
|
|
// RoundTrip sends a HTTP request to a backend and then returns its response.
|
2017-03-26 19:50:51 +00:00
|
|
|
func (s *Server) RoundTrip(req *http.Request) (*http.Response, error) {
|
2017-03-27 04:56:54 +00:00
|
|
|
var conns []*Connection
|
|
|
|
|
|
|
|
val, ok := s.domains.Get(req.Host)
|
|
|
|
if ok {
|
|
|
|
conns, ok = val.([]*Connection)
|
2017-03-27 05:03:06 +00:00
|
|
|
if !ok {
|
2017-04-28 22:23:26 +00:00
|
|
|
ln.Error(ErrNoSuchBackend, ln.F{
|
2017-03-27 04:56:54 +00:00
|
|
|
"action": "no_backend_connected",
|
|
|
|
"remote": req.RemoteAddr,
|
|
|
|
"host": req.Host,
|
|
|
|
"uri": req.RequestURI,
|
|
|
|
})
|
|
|
|
|
2017-04-28 22:23:26 +00:00
|
|
|
return nil, ErrNoSuchBackend
|
2017-03-27 04:56:54 +00:00
|
|
|
}
|
2017-03-26 19:50:51 +00:00
|
|
|
}
|
|
|
|
|
2017-03-27 05:03:06 +00:00
|
|
|
if len(conns) == 0 {
|
2017-04-28 22:23:26 +00:00
|
|
|
ln.Error(ErrNoSuchBackend, ln.F{
|
2017-03-27 05:50:45 +00:00
|
|
|
"action": "no_backend_connected",
|
|
|
|
"remote": req.RemoteAddr,
|
|
|
|
"host": req.Host,
|
|
|
|
"uri": req.RequestURI,
|
|
|
|
})
|
|
|
|
|
2017-04-28 22:23:26 +00:00
|
|
|
return nil, ErrNoSuchBackend
|
2017-03-27 05:03:06 +00:00
|
|
|
}
|
|
|
|
|
2017-03-26 19:50:51 +00:00
|
|
|
c := conns[rand.Intn(len(conns))]
|
|
|
|
|
2017-04-06 04:44:12 +00:00
|
|
|
resp, err := c.RoundTrip(req)
|
2017-03-26 19:50:51 +00:00
|
|
|
if err != nil {
|
2017-04-06 04:44:12 +00:00
|
|
|
ln.Error(err, c.F(), ln.F{
|
|
|
|
"action": "connection_roundtrip",
|
|
|
|
})
|
2017-03-26 20:47:42 +00:00
|
|
|
|
2017-04-06 04:44:12 +00:00
|
|
|
defer c.cancel()
|
2017-03-26 19:50:51 +00:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2017-03-26 22:36:58 +00:00
|
|
|
ln.Log(c.F(), ln.F{
|
|
|
|
"action": "http_traffic",
|
|
|
|
"remote_addr": req.RemoteAddr,
|
|
|
|
"host": req.Host,
|
|
|
|
"uri": req.RequestURI,
|
|
|
|
})
|
|
|
|
|
2017-03-26 19:50:51 +00:00
|
|
|
return resp, nil
|
|
|
|
}
|
|
|
|
|
2017-04-28 22:23:26 +00:00
|
|
|
// Auth is the authentication info the client passes to the server.
|
2017-03-26 19:50:51 +00:00
|
|
|
type Auth struct {
|
|
|
|
Token string `json:"token"`
|
|
|
|
Domain string `json:"domain"`
|
|
|
|
}
|
|
|
|
|
|
|
|
const defaultUser = "Cadey"
|