2023-11-26 14:47:49 +00:00
|
|
|
use ahash::{HashMap, HashMapExt};
|
2023-11-27 07:36:21 +00:00
|
|
|
use anyhow::anyhow;
|
|
|
|
use futures_util::{pin_mut, Stream, StreamExt};
|
2023-10-23 17:11:12 +00:00
|
|
|
use std::cmp::min;
|
2023-12-01 21:25:01 +00:00
|
|
|
use std::fmt::Debug;
|
2023-11-27 07:36:21 +00:00
|
|
|
use std::future::Future;
|
2023-10-23 17:11:12 +00:00
|
|
|
use std::ops::{Deref, Not};
|
|
|
|
use std::pin::Pin;
|
|
|
|
use std::sync::Arc;
|
|
|
|
use std::time::Duration;
|
|
|
|
|
|
|
|
use super::{JwtTunnelConfig, JWT_DECODE};
|
2023-12-01 21:25:01 +00:00
|
|
|
use crate::{socks5, tcp, tls, udp, LocalProtocol, WsServerConfig};
|
|
|
|
use hyper::header::COOKIE;
|
|
|
|
use hyper::http::HeaderValue;
|
2023-10-23 17:11:12 +00:00
|
|
|
use hyper::server::conn::Http;
|
|
|
|
use hyper::service::service_fn;
|
|
|
|
use hyper::{http, Body, Request, Response, StatusCode};
|
|
|
|
use jsonwebtoken::TokenData;
|
2023-11-26 14:47:49 +00:00
|
|
|
use once_cell::sync::Lazy;
|
|
|
|
use parking_lot::Mutex;
|
2023-10-28 23:33:22 +00:00
|
|
|
|
2023-11-26 17:22:28 +00:00
|
|
|
use crate::udp::UdpStream;
|
2023-10-23 17:11:12 +00:00
|
|
|
use tokio::io::{AsyncRead, AsyncWrite};
|
2023-11-27 07:36:21 +00:00
|
|
|
use tokio::net::{TcpListener, TcpStream};
|
|
|
|
use tokio::select;
|
|
|
|
use tokio::sync::{mpsc, oneshot};
|
2023-10-28 16:18:48 +00:00
|
|
|
use tracing::{error, info, span, warn, Instrument, Level, Span};
|
2023-10-23 17:11:12 +00:00
|
|
|
use url::Host;
|
|
|
|
|
|
|
|
async fn from_query(
|
|
|
|
server_config: &WsServerConfig,
|
|
|
|
query: &str,
|
|
|
|
) -> anyhow::Result<(
|
|
|
|
LocalProtocol,
|
|
|
|
Host,
|
|
|
|
u16,
|
|
|
|
Pin<Box<dyn AsyncRead + Send>>,
|
|
|
|
Pin<Box<dyn AsyncWrite + Send>>,
|
|
|
|
)> {
|
|
|
|
let jwt: TokenData<JwtTunnelConfig> = match query.split_once('=') {
|
|
|
|
Some(("bearer", jwt)) => {
|
|
|
|
let (validation, decode_key) = JWT_DECODE.deref();
|
|
|
|
match jsonwebtoken::decode(jwt, decode_key, validation) {
|
|
|
|
Ok(jwt) => jwt,
|
|
|
|
err => {
|
|
|
|
error!("error while decoding jwt for tunnel info {:?}", err);
|
|
|
|
return Err(anyhow::anyhow!("Invalid upgrade request"));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
_err => return Err(anyhow::anyhow!("Invalid upgrade request")),
|
|
|
|
};
|
|
|
|
|
2023-11-27 07:36:21 +00:00
|
|
|
Span::current().record("id", &jwt.claims.id);
|
2023-10-23 17:11:12 +00:00
|
|
|
Span::current().record("remote", format!("{}:{}", jwt.claims.r, jwt.claims.rp));
|
|
|
|
if let Some(allowed_dests) = &server_config.restrict_to {
|
|
|
|
let requested_dest = format!("{}:{}", jwt.claims.r, jwt.claims.rp);
|
2023-10-30 07:13:38 +00:00
|
|
|
if allowed_dests.iter().any(|dest| dest == &requested_dest).not() {
|
|
|
|
warn!("Rejecting connection with not allowed destination: {}", requested_dest);
|
2023-10-23 17:11:12 +00:00
|
|
|
return Err(anyhow::anyhow!("Invalid upgrade request"));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
match jwt.claims.p {
|
2023-10-31 07:32:52 +00:00
|
|
|
LocalProtocol::Udp { timeout, .. } => {
|
2023-10-23 17:11:12 +00:00
|
|
|
let host = Host::parse(&jwt.claims.r)?;
|
2023-10-31 07:32:52 +00:00
|
|
|
let cnx = udp::connect(&host, jwt.claims.rp, timeout.unwrap_or(Duration::from_secs(10))).await?;
|
2023-10-23 17:11:12 +00:00
|
|
|
Ok((
|
|
|
|
LocalProtocol::Udp { timeout: None },
|
|
|
|
host,
|
|
|
|
jwt.claims.rp,
|
2023-10-31 07:32:52 +00:00
|
|
|
Box::pin(cnx.clone()),
|
|
|
|
Box::pin(cnx),
|
2023-10-23 17:11:12 +00:00
|
|
|
))
|
|
|
|
}
|
2023-11-26 14:47:49 +00:00
|
|
|
LocalProtocol::Tcp => {
|
2023-10-23 17:11:12 +00:00
|
|
|
let host = Host::parse(&jwt.claims.r)?;
|
|
|
|
let port = jwt.claims.rp;
|
2023-11-26 17:22:28 +00:00
|
|
|
let (rx, tx) = tcp::connect(&host, port, server_config.socket_so_mark, Duration::from_secs(10))
|
2023-10-30 07:13:38 +00:00
|
|
|
.await?
|
|
|
|
.into_split();
|
2023-10-23 17:11:12 +00:00
|
|
|
|
|
|
|
Ok((jwt.claims.p, host, port, Box::pin(rx), Box::pin(tx)))
|
|
|
|
}
|
2023-11-26 14:47:49 +00:00
|
|
|
LocalProtocol::ReverseTcp => {
|
|
|
|
#[allow(clippy::type_complexity)]
|
2023-11-27 07:36:21 +00:00
|
|
|
static SERVERS: Lazy<Mutex<HashMap<(Host<String>, u16), mpsc::Receiver<TcpStream>>>> =
|
2023-11-26 14:47:49 +00:00
|
|
|
Lazy::new(|| Mutex::new(HashMap::with_capacity(0)));
|
|
|
|
|
|
|
|
let local_srv = (Host::parse(&jwt.claims.r)?, jwt.claims.rp);
|
2023-11-27 07:36:21 +00:00
|
|
|
let bind = format!("{}:{}", local_srv.0, local_srv.1);
|
2023-12-01 19:20:33 +00:00
|
|
|
let listening_server = tcp::run_server(bind.parse()?, false);
|
2023-11-27 07:36:21 +00:00
|
|
|
let tcp = run_listening_server(&local_srv, SERVERS.deref(), listening_server).await?;
|
|
|
|
let (local_rx, local_tx) = tcp.into_split();
|
2023-11-26 14:47:49 +00:00
|
|
|
|
|
|
|
Ok((jwt.claims.p, local_srv.0, local_srv.1, Box::pin(local_rx), Box::pin(local_tx)))
|
|
|
|
}
|
2023-11-26 17:22:28 +00:00
|
|
|
LocalProtocol::ReverseUdp { timeout } => {
|
|
|
|
#[allow(clippy::type_complexity)]
|
2023-11-27 07:36:21 +00:00
|
|
|
static SERVERS: Lazy<Mutex<HashMap<(Host<String>, u16), mpsc::Receiver<UdpStream>>>> =
|
|
|
|
Lazy::new(|| Mutex::new(HashMap::with_capacity(0)));
|
2023-11-26 17:22:28 +00:00
|
|
|
|
|
|
|
let local_srv = (Host::parse(&jwt.claims.r)?, jwt.claims.rp);
|
2023-11-27 07:36:21 +00:00
|
|
|
let bind = format!("{}:{}", local_srv.0, local_srv.1);
|
|
|
|
let listening_server = udp::run_server(bind.parse()?, timeout);
|
|
|
|
let udp = run_listening_server(&local_srv, SERVERS.deref(), listening_server).await?;
|
2023-11-26 17:22:28 +00:00
|
|
|
let (local_rx, local_tx) = tokio::io::split(udp);
|
|
|
|
|
|
|
|
Ok((jwt.claims.p, local_srv.0, local_srv.1, Box::pin(local_rx), Box::pin(local_tx)))
|
|
|
|
}
|
2023-12-01 21:25:01 +00:00
|
|
|
LocalProtocol::ReverseSocks5 => {
|
|
|
|
#[allow(clippy::type_complexity)]
|
|
|
|
static SERVERS: Lazy<Mutex<HashMap<(Host<String>, u16), mpsc::Receiver<(TcpStream, (Host, u16))>>>> =
|
|
|
|
Lazy::new(|| Mutex::new(HashMap::with_capacity(0)));
|
|
|
|
|
|
|
|
let local_srv = (Host::parse(&jwt.claims.r)?, jwt.claims.rp);
|
|
|
|
let bind = format!("{}:{}", local_srv.0, local_srv.1);
|
|
|
|
let listening_server = socks5::run_server(bind.parse()?);
|
|
|
|
let (tcp, local_srv) = run_listening_server(&local_srv, SERVERS.deref(), listening_server).await?;
|
|
|
|
let (local_rx, local_tx) = tokio::io::split(tcp);
|
|
|
|
|
|
|
|
Ok((jwt.claims.p, local_srv.0, local_srv.1, Box::pin(local_rx), Box::pin(local_tx)))
|
|
|
|
}
|
2023-10-23 17:11:12 +00:00
|
|
|
_ => Err(anyhow::anyhow!("Invalid upgrade request")),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-11-27 07:36:21 +00:00
|
|
|
#[allow(clippy::type_complexity)]
|
2023-12-01 21:25:01 +00:00
|
|
|
async fn run_listening_server<T, Fut, FutOut, E>(
|
2023-11-27 07:36:21 +00:00
|
|
|
local_srv: &(Host, u16),
|
|
|
|
servers: &Mutex<HashMap<(Host<String>, u16), mpsc::Receiver<T>>>,
|
|
|
|
gen_listening_server: Fut,
|
|
|
|
) -> anyhow::Result<T>
|
|
|
|
where
|
|
|
|
Fut: Future<Output = anyhow::Result<FutOut>>,
|
2023-12-01 21:25:01 +00:00
|
|
|
FutOut: Stream<Item = Result<T, E>> + Send + 'static,
|
|
|
|
E: Debug + Send,
|
2023-11-27 07:36:21 +00:00
|
|
|
T: Send + 'static,
|
|
|
|
{
|
|
|
|
let listening_server = servers.lock().remove(local_srv);
|
|
|
|
let mut listening_server = if let Some(listening_server) = listening_server {
|
|
|
|
listening_server
|
|
|
|
} else {
|
|
|
|
let listening_server = gen_listening_server.await?;
|
|
|
|
let (tx, rx) = mpsc::channel::<T>(1);
|
|
|
|
let fut = async move {
|
|
|
|
pin_mut!(listening_server);
|
|
|
|
loop {
|
|
|
|
select! {
|
|
|
|
biased;
|
|
|
|
cnx = listening_server.next() => {
|
|
|
|
match cnx {
|
|
|
|
None => break,
|
|
|
|
Some(Err(err)) => {
|
|
|
|
warn!("Error while listening for incoming connections {err:?}");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
Some(Ok(cnx)) => {
|
|
|
|
if tx.send_timeout(cnx, Duration::from_secs(30)).await.is_err() {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
_ = tx.closed() => {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
info!("Stopping listening server");
|
|
|
|
};
|
|
|
|
|
|
|
|
tokio::spawn(fut.instrument(Span::current()));
|
|
|
|
rx
|
|
|
|
};
|
|
|
|
|
|
|
|
let cnx = listening_server
|
|
|
|
.recv()
|
|
|
|
.await
|
|
|
|
.ok_or_else(|| anyhow!("listening server stopped"))?;
|
|
|
|
servers.lock().insert(local_srv.clone(), listening_server);
|
|
|
|
Ok(cnx)
|
|
|
|
}
|
|
|
|
|
2023-10-23 17:11:12 +00:00
|
|
|
async fn server_upgrade(
|
|
|
|
server_config: Arc<WsServerConfig>,
|
|
|
|
mut req: Request<Body>,
|
|
|
|
) -> Result<Response<Body>, anyhow::Error> {
|
|
|
|
if let Some(x) = req.headers().get("X-Forwarded-For") {
|
|
|
|
info!("Request X-Forwarded-For: {:?}", x);
|
|
|
|
Span::current().record("forwarded_for", x.to_str().unwrap_or_default());
|
|
|
|
}
|
|
|
|
|
|
|
|
if !req.uri().path().ends_with("/events") {
|
2023-10-30 07:13:38 +00:00
|
|
|
warn!("Rejecting connection with bad upgrade request: {}", req.uri());
|
2023-10-23 17:11:12 +00:00
|
|
|
return Ok(http::Response::builder()
|
|
|
|
.status(StatusCode::BAD_REQUEST)
|
|
|
|
.body(Body::from("Invalid upgrade request"))
|
|
|
|
.unwrap_or_default());
|
|
|
|
}
|
|
|
|
|
|
|
|
if let Some(path_prefix) = &server_config.restrict_http_upgrade_path_prefix {
|
|
|
|
let path = req.uri().path();
|
|
|
|
let min_len = min(path.len(), 1);
|
|
|
|
let max_len = min(path.len(), path_prefix.len() + 1);
|
|
|
|
if &path[0..min_len] != "/"
|
|
|
|
|| &path[min_len..max_len] != path_prefix.as_str()
|
|
|
|
|| !path[max_len..].starts_with('/')
|
|
|
|
{
|
2023-10-30 07:13:38 +00:00
|
|
|
warn!("Rejecting connection with bad path prefix in upgrade request: {}", req.uri());
|
2023-10-23 17:11:12 +00:00
|
|
|
return Ok(http::Response::builder()
|
|
|
|
.status(StatusCode::BAD_REQUEST)
|
|
|
|
.body(Body::from("Invalid upgrade request"))
|
|
|
|
.unwrap_or_default());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
let (protocol, dest, port, local_rx, local_tx) =
|
|
|
|
match from_query(&server_config, req.uri().query().unwrap_or_default()).await {
|
|
|
|
Ok(ret) => ret,
|
|
|
|
Err(err) => {
|
2023-10-30 07:13:38 +00:00
|
|
|
warn!("Rejecting connection with bad upgrade request: {} {}", err, req.uri());
|
2023-10-23 17:11:12 +00:00
|
|
|
return Ok(http::Response::builder()
|
|
|
|
.status(StatusCode::BAD_REQUEST)
|
|
|
|
.body(Body::from(format!("Invalid upgrade request: {:?}", err)))
|
|
|
|
.unwrap_or_default());
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
info!("connected to {:?} {:?} {:?}", protocol, dest, port);
|
2023-12-01 21:25:01 +00:00
|
|
|
let (mut response, fut) = match fastwebsockets::upgrade::upgrade(&mut req) {
|
2023-10-23 17:11:12 +00:00
|
|
|
Ok(ret) => ret,
|
|
|
|
Err(err) => {
|
2023-10-30 07:13:38 +00:00
|
|
|
warn!("Rejecting connection with bad upgrade request: {} {}", err, req.uri());
|
2023-10-23 17:11:12 +00:00
|
|
|
return Ok(http::Response::builder()
|
|
|
|
.status(StatusCode::BAD_REQUEST)
|
|
|
|
.body(Body::from(format!("Invalid upgrade request: {:?}", err)))
|
|
|
|
.unwrap_or_default());
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
tokio::spawn(
|
|
|
|
async move {
|
|
|
|
let (ws_rx, mut ws_tx) = match fut.await {
|
|
|
|
Ok(ws) => ws.split(tokio::io::split),
|
|
|
|
Err(err) => {
|
|
|
|
error!("Error during http upgrade request: {:?}", err);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
let (close_tx, close_rx) = oneshot::channel::<()>();
|
|
|
|
ws_tx.set_auto_apply_mask(server_config.websocket_mask_frame);
|
|
|
|
|
2023-10-30 07:13:38 +00:00
|
|
|
tokio::task::spawn(super::io::propagate_write(local_tx, ws_rx, close_rx).instrument(Span::current()));
|
2023-10-23 17:11:12 +00:00
|
|
|
|
2023-11-03 08:17:56 +00:00
|
|
|
let _ = super::io::propagate_read(local_rx, ws_tx, close_tx, None).await;
|
2023-10-23 17:11:12 +00:00
|
|
|
}
|
|
|
|
.instrument(Span::current()),
|
|
|
|
);
|
|
|
|
|
2023-12-01 21:25:01 +00:00
|
|
|
response
|
|
|
|
.headers_mut()
|
|
|
|
.insert(COOKIE, HeaderValue::from_str(&format!("fake://{}:{}", dest, port)).unwrap());
|
2023-10-23 17:11:12 +00:00
|
|
|
Ok(response)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub async fn run_server(server_config: Arc<WsServerConfig>) -> anyhow::Result<()> {
|
2023-10-30 07:13:38 +00:00
|
|
|
info!("Starting wstunnel server listening on {}", server_config.bind);
|
2023-10-23 17:11:12 +00:00
|
|
|
|
|
|
|
let config = server_config.clone();
|
|
|
|
let upgrade_fn = move |req: Request<Body>| server_upgrade(config.clone(), req);
|
|
|
|
|
|
|
|
let listener = TcpListener::bind(&server_config.bind).await?;
|
|
|
|
let tls_acceptor = if let Some(tls) = &server_config.tls {
|
|
|
|
Some(tls::tls_acceptor(tls, Some(vec![b"http/1.1".to_vec()]))?)
|
|
|
|
} else {
|
|
|
|
None
|
|
|
|
};
|
|
|
|
|
|
|
|
loop {
|
|
|
|
let (stream, peer_addr) = listener.accept().await?;
|
|
|
|
let _ = stream.set_nodelay(true);
|
|
|
|
|
|
|
|
let span = span!(
|
|
|
|
Level::INFO,
|
|
|
|
"tunnel",
|
|
|
|
id = tracing::field::Empty,
|
|
|
|
remote = tracing::field::Empty,
|
|
|
|
peer = peer_addr.to_string(),
|
|
|
|
forwarded_for = tracing::field::Empty
|
|
|
|
);
|
|
|
|
|
|
|
|
info!("Accepting connection");
|
|
|
|
let upgrade_fn = upgrade_fn.clone();
|
|
|
|
// TLS
|
|
|
|
if let Some(tls_acceptor) = &tls_acceptor {
|
|
|
|
let tls_acceptor = tls_acceptor.clone();
|
|
|
|
let fut = async move {
|
|
|
|
info!("Doing TLS handshake");
|
|
|
|
let tls_stream = match tls_acceptor.accept(stream).await {
|
|
|
|
Ok(tls_stream) => tls_stream,
|
|
|
|
Err(err) => {
|
|
|
|
error!("error while accepting TLS connection {}", err);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
let conn_fut = Http::new()
|
|
|
|
.http1_only(true)
|
|
|
|
.serve_connection(tls_stream, service_fn(upgrade_fn))
|
|
|
|
.with_upgrades();
|
|
|
|
|
|
|
|
if let Err(e) = conn_fut.await {
|
|
|
|
error!("Error while upgrading cnx to websocket: {:?}", e);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
.instrument(span);
|
|
|
|
|
|
|
|
tokio::spawn(fut);
|
|
|
|
// Normal
|
|
|
|
} else {
|
|
|
|
let conn_fut = Http::new()
|
|
|
|
.http1_only(true)
|
|
|
|
.serve_connection(stream, service_fn(upgrade_fn))
|
|
|
|
.with_upgrades();
|
|
|
|
|
|
|
|
let fut = async move {
|
|
|
|
if let Err(e) = conn_fut.await {
|
2023-10-27 19:02:12 +00:00
|
|
|
error!("Error while upgrading cnx to websocket: {:?}", e);
|
2023-10-23 17:11:12 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
.instrument(span);
|
|
|
|
|
|
|
|
tokio::spawn(fut);
|
|
|
|
};
|
|
|
|
}
|
|
|
|
}
|