2019-08-05 21:41:48 +03:00
|
|
|
package tunnel
|
|
|
|
|
|
|
|
import (
|
2019-08-07 20:44:33 +03:00
|
|
|
"crypto/sha256"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
2019-08-05 21:41:48 +03:00
|
|
|
"sync"
|
|
|
|
|
2019-08-07 20:44:33 +03:00
|
|
|
"github.com/google/uuid"
|
2019-08-05 21:41:48 +03:00
|
|
|
"github.com/micro/go-micro/transport"
|
2019-08-07 20:44:33 +03:00
|
|
|
"github.com/micro/go-micro/util/log"
|
2019-08-05 21:41:48 +03:00
|
|
|
)
|
|
|
|
|
2019-08-07 20:44:33 +03:00
|
|
|
// tun represents a network tunnel
|
2019-08-05 21:41:48 +03:00
|
|
|
type tun struct {
|
2019-08-07 20:44:33 +03:00
|
|
|
options Options
|
|
|
|
|
2019-08-05 21:41:48 +03:00
|
|
|
sync.RWMutex
|
2019-08-07 20:44:33 +03:00
|
|
|
|
2019-08-13 22:11:23 +03:00
|
|
|
// tunnel token
|
|
|
|
token string
|
|
|
|
|
2019-08-07 20:44:33 +03:00
|
|
|
// to indicate if we're connected or not
|
2019-08-05 21:41:48 +03:00
|
|
|
connected bool
|
2019-08-07 20:44:33 +03:00
|
|
|
|
|
|
|
// the send channel for all messages
|
|
|
|
send chan *message
|
|
|
|
|
|
|
|
// close channel
|
|
|
|
closed chan bool
|
|
|
|
|
|
|
|
// a map of sockets based on Micro-Tunnel-Id
|
|
|
|
sockets map[string]*socket
|
|
|
|
|
|
|
|
// outbound links
|
|
|
|
links map[string]*link
|
|
|
|
|
|
|
|
// listener
|
|
|
|
listener transport.Listener
|
2019-08-05 21:41:48 +03:00
|
|
|
}
|
|
|
|
|
2019-08-07 20:44:33 +03:00
|
|
|
type link struct {
|
|
|
|
transport.Socket
|
|
|
|
id string
|
|
|
|
}
|
2019-08-05 21:41:48 +03:00
|
|
|
|
2019-08-07 20:44:33 +03:00
|
|
|
// create new tunnel on top of a link
|
|
|
|
func newTunnel(opts ...Option) *tun {
|
|
|
|
options := DefaultOptions()
|
2019-08-05 21:41:48 +03:00
|
|
|
for _, o := range opts {
|
|
|
|
o(&options)
|
|
|
|
}
|
|
|
|
|
2019-08-07 20:44:33 +03:00
|
|
|
return &tun{
|
2019-08-05 21:41:48 +03:00
|
|
|
options: options,
|
2019-08-13 22:11:23 +03:00
|
|
|
token: uuid.New().String(),
|
2019-08-07 20:44:33 +03:00
|
|
|
send: make(chan *message, 128),
|
2019-08-05 21:41:48 +03:00
|
|
|
closed: make(chan bool),
|
2019-08-07 20:44:33 +03:00
|
|
|
sockets: make(map[string]*socket),
|
|
|
|
links: make(map[string]*link),
|
2019-08-05 21:41:48 +03:00
|
|
|
}
|
2019-08-07 20:44:33 +03:00
|
|
|
}
|
2019-08-05 21:41:48 +03:00
|
|
|
|
2019-08-07 20:44:33 +03:00
|
|
|
// getSocket returns a socket from the internal socket map.
|
|
|
|
// It does this based on the Micro-Tunnel-Id and Micro-Tunnel-Session
|
|
|
|
func (t *tun) getSocket(id, session string) (*socket, bool) {
|
|
|
|
// get the socket
|
|
|
|
t.RLock()
|
|
|
|
s, ok := t.sockets[id+session]
|
|
|
|
t.RUnlock()
|
|
|
|
return s, ok
|
2019-08-05 21:41:48 +03:00
|
|
|
}
|
|
|
|
|
2019-08-07 20:44:33 +03:00
|
|
|
// newSocket creates a new socket and saves it
|
|
|
|
func (t *tun) newSocket(id, session string) (*socket, bool) {
|
|
|
|
// hash the id
|
|
|
|
h := sha256.New()
|
|
|
|
h.Write([]byte(id))
|
|
|
|
id = fmt.Sprintf("%x", h.Sum(nil))
|
|
|
|
|
|
|
|
// new socket
|
|
|
|
s := &socket{
|
|
|
|
id: id,
|
|
|
|
session: session,
|
|
|
|
closed: make(chan bool),
|
|
|
|
recv: make(chan *message, 128),
|
|
|
|
send: t.send,
|
|
|
|
wait: make(chan bool),
|
|
|
|
}
|
|
|
|
|
|
|
|
// save socket
|
|
|
|
t.Lock()
|
|
|
|
_, ok := t.sockets[id+session]
|
|
|
|
if ok {
|
|
|
|
// socket already exists
|
|
|
|
t.Unlock()
|
|
|
|
return nil, false
|
|
|
|
}
|
|
|
|
t.sockets[id+session] = s
|
|
|
|
t.Unlock()
|
|
|
|
|
|
|
|
// return socket
|
|
|
|
return s, true
|
2019-08-05 21:41:48 +03:00
|
|
|
}
|
|
|
|
|
2019-08-07 20:44:33 +03:00
|
|
|
// TODO: use tunnel id as part of the session
|
|
|
|
func (t *tun) newSession() string {
|
|
|
|
return uuid.New().String()
|
2019-08-06 13:45:25 +03:00
|
|
|
}
|
|
|
|
|
2019-08-07 20:44:33 +03:00
|
|
|
// process outgoing messages sent by all local sockets
|
|
|
|
func (t *tun) process() {
|
|
|
|
// manage the send buffer
|
|
|
|
// all pseudo sockets throw everything down this
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case msg := <-t.send:
|
2019-08-10 18:37:49 +03:00
|
|
|
newMsg := &transport.Message{
|
|
|
|
Header: make(map[string]string),
|
2019-08-07 20:44:33 +03:00
|
|
|
Body: msg.data.Body,
|
|
|
|
}
|
|
|
|
|
2019-08-10 18:37:49 +03:00
|
|
|
for k, v := range msg.data.Header {
|
|
|
|
newMsg.Header[k] = v
|
2019-08-08 14:45:37 +03:00
|
|
|
}
|
|
|
|
|
2019-08-07 20:44:33 +03:00
|
|
|
// set the tunnel id on the outgoing message
|
2019-08-10 18:37:49 +03:00
|
|
|
newMsg.Header["Micro-Tunnel-Id"] = msg.id
|
2019-08-07 20:44:33 +03:00
|
|
|
|
|
|
|
// set the session id
|
2019-08-10 18:37:49 +03:00
|
|
|
newMsg.Header["Micro-Tunnel-Session"] = msg.session
|
2019-08-07 20:44:33 +03:00
|
|
|
|
|
|
|
// send the message via the interface
|
|
|
|
t.RLock()
|
2019-08-11 20:11:33 +03:00
|
|
|
if len(t.links) == 0 {
|
|
|
|
log.Debugf("Zero links to send to")
|
|
|
|
}
|
2019-08-07 20:44:33 +03:00
|
|
|
for _, link := range t.links {
|
2019-08-10 18:37:49 +03:00
|
|
|
log.Debugf("Sending %+v to %s", newMsg, link.Remote())
|
2019-08-11 23:53:40 +03:00
|
|
|
// TODO: error check and reconnect
|
2019-08-10 18:37:49 +03:00
|
|
|
link.Send(newMsg)
|
2019-08-07 20:44:33 +03:00
|
|
|
}
|
|
|
|
t.RUnlock()
|
|
|
|
case <-t.closed:
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2019-08-05 21:41:48 +03:00
|
|
|
}
|
|
|
|
|
2019-08-07 20:44:33 +03:00
|
|
|
// process incoming messages
|
2019-08-13 22:11:23 +03:00
|
|
|
func (t *tun) listen(link transport.Socket) {
|
2019-08-07 20:44:33 +03:00
|
|
|
for {
|
|
|
|
// process anything via the net interface
|
|
|
|
msg := new(transport.Message)
|
|
|
|
err := link.Recv(msg)
|
|
|
|
if err != nil {
|
2019-08-11 20:11:33 +03:00
|
|
|
log.Debugf("Tunnel link %s receive error: %v", link.Remote(), err)
|
2019-08-07 20:44:33 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-08-13 22:11:23 +03:00
|
|
|
var loopback bool
|
|
|
|
|
2019-08-07 20:44:33 +03:00
|
|
|
switch msg.Header["Micro-Tunnel"] {
|
2019-08-13 22:11:23 +03:00
|
|
|
case "connect":
|
|
|
|
// TODO: handle the connect message
|
|
|
|
// check the Micro-Tunnel-Token
|
|
|
|
token, ok := msg.Header["Micro-Tunnel-Token"]
|
|
|
|
if !ok {
|
|
|
|
// no token found; bailing
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
// are we connecting to ourselves?
|
|
|
|
if token == t.token {
|
|
|
|
loopback = true
|
|
|
|
}
|
|
|
|
case "close":
|
|
|
|
// TODO: handle the close message
|
|
|
|
// maybe report io.EOF or kill the link
|
2019-08-07 20:44:33 +03:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// the tunnel id
|
|
|
|
id := msg.Header["Micro-Tunnel-Id"]
|
2019-08-11 23:53:40 +03:00
|
|
|
delete(msg.Header, "Micro-Tunnel-Id")
|
2019-08-07 20:44:33 +03:00
|
|
|
|
|
|
|
// the session id
|
|
|
|
session := msg.Header["Micro-Tunnel-Session"]
|
2019-08-11 23:53:40 +03:00
|
|
|
delete(msg.Header, "Micro-Tunnel-Session")
|
2019-08-07 20:44:33 +03:00
|
|
|
|
|
|
|
// if the session id is blank there's nothing we can do
|
|
|
|
// TODO: check this is the case, is there any reason
|
|
|
|
// why we'd have a blank session? Is the tunnel
|
|
|
|
// used for some other purpose?
|
|
|
|
if len(id) == 0 || len(session) == 0 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
var s *socket
|
|
|
|
var exists bool
|
|
|
|
|
2019-08-10 18:37:49 +03:00
|
|
|
log.Debugf("Received %+v from %s", msg, link.Remote())
|
2019-08-13 22:11:23 +03:00
|
|
|
|
|
|
|
switch {
|
|
|
|
case loopback:
|
2019-08-07 20:44:33 +03:00
|
|
|
s, exists = t.getSocket(id, "listener")
|
2019-08-13 22:11:23 +03:00
|
|
|
default:
|
|
|
|
// get the socket based on the tunnel id and session
|
|
|
|
// this could be something we dialed in which case
|
|
|
|
// we have a session for it otherwise its a listener
|
|
|
|
s, exists = t.getSocket(id, session)
|
2019-08-07 20:44:33 +03:00
|
|
|
}
|
2019-08-13 22:11:23 +03:00
|
|
|
// bail if no socket has been found
|
2019-08-07 20:44:33 +03:00
|
|
|
if !exists {
|
2019-08-11 20:11:33 +03:00
|
|
|
log.Debugf("Tunnel skipping no socket exists")
|
2019-08-07 20:44:33 +03:00
|
|
|
// drop it, we don't care about
|
|
|
|
// messages we don't know about
|
|
|
|
continue
|
|
|
|
}
|
2019-08-11 20:11:33 +03:00
|
|
|
log.Debugf("Tunnel using socket %s %s", s.id, s.session)
|
2019-08-07 20:44:33 +03:00
|
|
|
|
|
|
|
// is the socket closed?
|
|
|
|
select {
|
|
|
|
case <-s.closed:
|
|
|
|
// closed
|
|
|
|
delete(t.sockets, id)
|
|
|
|
continue
|
|
|
|
default:
|
|
|
|
// process
|
|
|
|
}
|
|
|
|
|
|
|
|
// is the socket new?
|
|
|
|
select {
|
|
|
|
// if its new the socket is actually blocked waiting
|
|
|
|
// for a connection. so we check if its waiting.
|
|
|
|
case <-s.wait:
|
|
|
|
// if its waiting e.g its new then we close it
|
|
|
|
default:
|
|
|
|
// set remote address of the socket
|
|
|
|
s.remote = msg.Header["Remote"]
|
|
|
|
close(s.wait)
|
|
|
|
}
|
|
|
|
|
|
|
|
// construct a new transport message
|
|
|
|
tmsg := &transport.Message{
|
|
|
|
Header: msg.Header,
|
|
|
|
Body: msg.Body,
|
|
|
|
}
|
|
|
|
|
|
|
|
// construct the internal message
|
|
|
|
imsg := &message{
|
|
|
|
id: id,
|
|
|
|
session: session,
|
|
|
|
data: tmsg,
|
|
|
|
}
|
|
|
|
|
|
|
|
// append to recv backlog
|
|
|
|
// we don't block if we can't pass it on
|
|
|
|
select {
|
|
|
|
case s.recv <- imsg:
|
|
|
|
default:
|
|
|
|
}
|
|
|
|
}
|
2019-08-05 21:41:48 +03:00
|
|
|
}
|
|
|
|
|
2019-08-07 20:44:33 +03:00
|
|
|
func (t *tun) connect() error {
|
|
|
|
l, err := t.options.Transport.Listen(t.options.Address)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// save the listener
|
|
|
|
t.listener = l
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
// accept inbound connections
|
|
|
|
err := l.Accept(func(sock transport.Socket) {
|
2019-08-08 15:15:30 +03:00
|
|
|
log.Debugf("Tunnel accepted connection from %s", sock.Remote())
|
2019-08-07 20:44:33 +03:00
|
|
|
// save the link
|
|
|
|
id := uuid.New().String()
|
|
|
|
t.Lock()
|
|
|
|
t.links[id] = &link{
|
|
|
|
Socket: sock,
|
|
|
|
id: id,
|
|
|
|
}
|
|
|
|
t.Unlock()
|
|
|
|
|
|
|
|
// delete the link
|
|
|
|
defer func() {
|
2019-08-11 20:11:33 +03:00
|
|
|
log.Debugf("Deleting connection from %s", sock.Remote())
|
2019-08-07 20:44:33 +03:00
|
|
|
t.Lock()
|
|
|
|
delete(t.links, id)
|
|
|
|
t.Unlock()
|
|
|
|
}()
|
|
|
|
|
|
|
|
// listen for inbound messages
|
2019-08-13 22:11:23 +03:00
|
|
|
t.listen(sock)
|
2019-08-07 20:44:33 +03:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Lock()
|
|
|
|
defer t.Unlock()
|
|
|
|
|
|
|
|
// still connected but the tunnel died
|
|
|
|
if err != nil && t.connected {
|
|
|
|
log.Logf("Tunnel listener died: %v", err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
for _, node := range t.options.Nodes {
|
2019-08-08 15:15:30 +03:00
|
|
|
// skip zero length nodes
|
|
|
|
if len(node) == 0 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
log.Debugf("Tunnel dialing %s", node)
|
2019-08-11 23:53:40 +03:00
|
|
|
// TODO: reconnection logic is required to keep the tunnel established
|
2019-08-07 20:44:33 +03:00
|
|
|
c, err := t.options.Transport.Dial(node)
|
|
|
|
if err != nil {
|
|
|
|
log.Debugf("Tunnel failed to connect to %s: %v", node, err)
|
|
|
|
continue
|
|
|
|
}
|
2019-08-08 15:15:30 +03:00
|
|
|
log.Debugf("Tunnel connected to %s", node)
|
2019-08-07 20:44:33 +03:00
|
|
|
|
2019-08-08 02:19:16 +03:00
|
|
|
if err := c.Send(&transport.Message{
|
2019-08-07 20:44:33 +03:00
|
|
|
Header: map[string]string{
|
2019-08-13 22:11:23 +03:00
|
|
|
"Micro-Tunnel": "connect",
|
|
|
|
"Micro-Tunnel-Token": t.token,
|
2019-08-07 20:44:33 +03:00
|
|
|
},
|
2019-08-08 02:19:16 +03:00
|
|
|
}); err != nil {
|
2019-08-07 20:44:33 +03:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// process incoming messages
|
2019-08-13 22:11:23 +03:00
|
|
|
go t.listen(c)
|
2019-08-07 20:44:33 +03:00
|
|
|
|
|
|
|
// save the link
|
|
|
|
id := uuid.New().String()
|
|
|
|
t.links[id] = &link{
|
|
|
|
Socket: c,
|
|
|
|
id: id,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// process outbound messages to be sent
|
|
|
|
// process sends to all links
|
|
|
|
go t.process()
|
|
|
|
|
2019-08-05 21:41:48 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-08-07 20:44:33 +03:00
|
|
|
func (t *tun) close() error {
|
|
|
|
// close all the links
|
|
|
|
for id, link := range t.links {
|
|
|
|
link.Send(&transport.Message{
|
|
|
|
Header: map[string]string{
|
|
|
|
"Micro-Tunnel": "close",
|
|
|
|
},
|
|
|
|
})
|
|
|
|
link.Close()
|
|
|
|
delete(t.links, id)
|
|
|
|
}
|
|
|
|
|
|
|
|
// close the listener
|
|
|
|
return t.listener.Close()
|
2019-08-05 21:41:48 +03:00
|
|
|
}
|
|
|
|
|
2019-08-07 20:44:33 +03:00
|
|
|
// Close the tunnel
|
|
|
|
func (t *tun) Close() error {
|
|
|
|
t.Lock()
|
|
|
|
defer t.Unlock()
|
|
|
|
|
|
|
|
if !t.connected {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-08-05 21:41:48 +03:00
|
|
|
select {
|
|
|
|
case <-t.closed:
|
2019-08-07 20:44:33 +03:00
|
|
|
return nil
|
2019-08-05 21:41:48 +03:00
|
|
|
default:
|
2019-08-07 20:44:33 +03:00
|
|
|
// close all the sockets
|
|
|
|
for _, s := range t.sockets {
|
|
|
|
s.Close()
|
|
|
|
}
|
|
|
|
// close the connection
|
|
|
|
close(t.closed)
|
|
|
|
t.connected = false
|
|
|
|
|
|
|
|
// send a close message
|
|
|
|
// we don't close the link
|
|
|
|
// just the tunnel
|
|
|
|
return t.close()
|
2019-08-05 21:41:48 +03:00
|
|
|
}
|
2019-08-07 20:44:33 +03:00
|
|
|
|
|
|
|
return nil
|
2019-08-05 21:41:48 +03:00
|
|
|
}
|
|
|
|
|
2019-08-07 20:44:33 +03:00
|
|
|
// Connect the tunnel
|
|
|
|
func (t *tun) Connect() error {
|
|
|
|
t.Lock()
|
|
|
|
defer t.Unlock()
|
|
|
|
|
|
|
|
// already connected
|
|
|
|
if t.connected {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// send the connect message
|
|
|
|
if err := t.connect(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// set as connected
|
|
|
|
t.connected = true
|
|
|
|
// create new close channel
|
|
|
|
t.closed = make(chan bool)
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-08-07 23:58:25 +03:00
|
|
|
func (t *tun) Init(opts ...Option) error {
|
|
|
|
for _, o := range opts {
|
|
|
|
o(&t.options)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-08-07 20:44:33 +03:00
|
|
|
// Dial an address
|
|
|
|
func (t *tun) Dial(addr string) (Conn, error) {
|
2019-08-10 18:37:49 +03:00
|
|
|
log.Debugf("Tunnel dialing %s", addr)
|
2019-08-07 20:44:33 +03:00
|
|
|
c, ok := t.newSocket(addr, t.newSession())
|
|
|
|
if !ok {
|
|
|
|
return nil, errors.New("error dialing " + addr)
|
|
|
|
}
|
2019-08-08 02:19:16 +03:00
|
|
|
|
2019-08-07 20:44:33 +03:00
|
|
|
// set remote
|
|
|
|
c.remote = addr
|
|
|
|
// set local
|
|
|
|
c.local = "local"
|
|
|
|
|
|
|
|
return c, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Accept a connection on the address
|
|
|
|
func (t *tun) Listen(addr string) (Listener, error) {
|
2019-08-10 18:37:49 +03:00
|
|
|
log.Debugf("Tunnel listening on %s", addr)
|
2019-08-07 20:44:33 +03:00
|
|
|
// create a new socket by hashing the address
|
|
|
|
c, ok := t.newSocket(addr, "listener")
|
|
|
|
if !ok {
|
|
|
|
return nil, errors.New("already listening on " + addr)
|
|
|
|
}
|
|
|
|
|
|
|
|
// set remote. it will be replaced by the first message received
|
|
|
|
c.remote = "remote"
|
|
|
|
// set local
|
|
|
|
c.local = addr
|
|
|
|
|
|
|
|
tl := &tunListener{
|
|
|
|
addr: addr,
|
|
|
|
// the accept channel
|
|
|
|
accept: make(chan *socket, 128),
|
|
|
|
// the channel to close
|
|
|
|
closed: make(chan bool),
|
2019-08-08 17:20:53 +03:00
|
|
|
// tunnel closed channel
|
|
|
|
tunClosed: t.closed,
|
2019-08-07 20:44:33 +03:00
|
|
|
// the connection
|
|
|
|
conn: c,
|
|
|
|
// the listener socket
|
|
|
|
socket: c,
|
|
|
|
}
|
|
|
|
|
|
|
|
// this kicks off the internal message processor
|
|
|
|
// for the listener so it can create pseudo sockets
|
|
|
|
// per session if they do not exist or pass messages
|
|
|
|
// to the existign sessions
|
|
|
|
go tl.process()
|
|
|
|
|
|
|
|
// return the listener
|
|
|
|
return tl, nil
|
2019-08-05 21:41:48 +03:00
|
|
|
}
|