1192 lines
52 KiB
Rust
1192 lines
52 KiB
Rust
mod embedded_certificate;
|
|
mod protocols;
|
|
mod restrictions;
|
|
mod tunnel;
|
|
|
|
use crate::protocols::dns::DnsResolver;
|
|
use crate::protocols::tls;
|
|
use crate::restrictions::types::RestrictionsRules;
|
|
use crate::tunnel::client::{TlsClientConfig, WsClient, WsClientConfig};
|
|
use crate::tunnel::connectors::{Socks5TunnelConnector, TcpTunnelConnector, UdpTunnelConnector};
|
|
use crate::tunnel::listeners::{
|
|
new_stdio_listener, HttpProxyTunnelListener, Socks5TunnelListener, TcpTunnelListener, UdpTunnelListener,
|
|
};
|
|
use crate::tunnel::server::{TlsServerConfig, WsServer, WsServerConfig};
|
|
use crate::tunnel::transport::{TransportAddr, TransportScheme};
|
|
use crate::tunnel::{to_host_port, LocalProtocol, RemoteAddr};
|
|
use anyhow::{anyhow, Context};
|
|
use base64::Engine;
|
|
use clap::Parser;
|
|
use hyper::header::HOST;
|
|
use hyper::http::{HeaderName, HeaderValue};
|
|
use log::debug;
|
|
use parking_lot::{Mutex, RwLock};
|
|
use std::collections::BTreeMap;
|
|
use std::fmt::Debug;
|
|
use std::io;
|
|
use std::io::ErrorKind;
|
|
use std::net::{IpAddr, Ipv4Addr, Ipv6Addr, SocketAddr, SocketAddrV4, SocketAddrV6};
|
|
use std::path::PathBuf;
|
|
use std::str::FromStr;
|
|
use std::sync::Arc;
|
|
use std::time::Duration;
|
|
use tokio::select;
|
|
use tokio_rustls::rustls::pki_types::DnsName;
|
|
use tracing::{error, info};
|
|
use tracing_subscriber::filter::Directive;
|
|
use tracing_subscriber::EnvFilter;
|
|
use url::{Host, Url};
|
|
|
|
const DEFAULT_CLIENT_UPGRADE_PATH_PREFIX: &str = "v1";
|
|
|
|
/// Use Websocket or HTTP2 protocol to tunnel {TCP,UDP} traffic
|
|
/// wsTunnelClient <---> wsTunnelServer <---> RemoteHost
|
|
#[derive(clap::Parser, Debug)]
|
|
#[command(author, version, about, verbatim_doc_comment, long_about = None)]
|
|
struct Wstunnel {
|
|
#[command(subcommand)]
|
|
commands: Commands,
|
|
|
|
/// Disable color output in logs
|
|
#[arg(long, global = true, verbatim_doc_comment, env = "NO_COLOR")]
|
|
no_color: Option<String>,
|
|
|
|
/// *WARNING* The flag does nothing, you need to set the env variable *WARNING*
|
|
/// Control the number of threads that will be used.
|
|
/// By default, it is equal the number of cpus
|
|
#[arg(
|
|
long,
|
|
global = true,
|
|
value_name = "INT",
|
|
verbatim_doc_comment,
|
|
env = "TOKIO_WORKER_THREADS"
|
|
)]
|
|
nb_worker_threads: Option<u32>,
|
|
|
|
/// Control the log verbosity. i.e: TRACE, DEBUG, INFO, WARN, ERROR, OFF
|
|
/// for more details: https://docs.rs/tracing-subscriber/latest/tracing_subscriber/filter/struct.EnvFilter.html#example-syntax
|
|
#[arg(
|
|
long,
|
|
global = true,
|
|
value_name = "LOG_LEVEL",
|
|
verbatim_doc_comment,
|
|
env = "RUST_LOG",
|
|
default_value = "INFO"
|
|
)]
|
|
log_lvl: String,
|
|
}
|
|
|
|
#[derive(clap::Subcommand, Debug)]
|
|
enum Commands {
|
|
Client(Box<Client>),
|
|
Server(Box<Server>),
|
|
}
|
|
#[derive(clap::Args, Debug)]
|
|
struct Client {
|
|
/// Listen on local and forwards traffic from remote. Can be specified multiple times
|
|
/// examples:
|
|
/// 'tcp://1212:google.com:443' => listen locally on tcp on port 1212 and forward to google.com on port 443
|
|
/// 'tcp://2:n.lan:4?proxy_protocol' => listen locally on tcp on port 2 and forward to n.lan on port 4
|
|
/// Send a proxy protocol header v2 when establishing connection to n.lan
|
|
///
|
|
/// 'udp://1212:1.1.1.1:53' => listen locally on udp on port 1212 and forward to cloudflare dns 1.1.1.1 on port 53
|
|
/// 'udp://1212:1.1.1.1:53?timeout_sec=10' timeout_sec on udp force close the tunnel after 10sec. Set it to 0 to disable the timeout [default: 30]
|
|
///
|
|
/// 'socks5://[::1]:1212' => listen locally with socks5 on port 1212 and forward dynamically requested tunnel
|
|
/// 'socks5://[::1]:1212?login=admin&password=admin' => listen locally with socks5 on port 1212 and only accept connection with login=admin and password=admin
|
|
///
|
|
/// 'http://[::1]:1212' => start a http proxy on port 1212 and forward dynamically requested tunnel
|
|
/// 'http://[::1]:1212?login=admin&password=admin' => start a http proxy on port 1212 and only accept connection with login=admin and password=admin
|
|
///
|
|
/// 'tproxy+tcp://[::1]:1212' => listen locally on tcp on port 1212 as a *transparent proxy* and forward dynamically requested tunnel
|
|
/// 'tproxy+udp://[::1]:1212?timeout_sec=10' listen locally on udp on port 1212 as a *transparent proxy* and forward dynamically requested tunnel
|
|
/// linux only and requires sudo/CAP_NET_ADMIN
|
|
///
|
|
/// 'stdio://google.com:443' => listen for data from stdio, mainly for `ssh -o ProxyCommand="wstunnel client -L stdio://%h:%p ws://localhost:8080" my-server`
|
|
///
|
|
/// 'unix:///tmp/wstunnel.sock:g.com:443' => listen for data from unix socket of path /tmp/wstunnel.sock and forward to g.com:443
|
|
#[arg(short='L', long, value_name = "{tcp,udp,socks5,stdio,unix}://[BIND:]PORT:HOST:PORT", value_parser = parse_tunnel_arg, verbatim_doc_comment)]
|
|
local_to_remote: Vec<LocalToRemote>,
|
|
|
|
/// Listen on remote and forwards traffic from local. Can be specified multiple times. Only tcp is supported
|
|
/// examples:
|
|
/// 'tcp://1212:google.com:443' => listen on server for incoming tcp cnx on port 1212 and forward to google.com on port 443 from local machine
|
|
/// 'udp://1212:1.1.1.1:53' => listen on server for incoming udp on port 1212 and forward to cloudflare dns 1.1.1.1 on port 53 from local machine
|
|
/// 'socks5://[::1]:1212' => listen on server for incoming socks5 request on port 1212 and forward dynamically request from local machine (login/password is supported)
|
|
/// 'http://[::1]:1212' => listen on server for incoming http proxy request on port 1212 and forward dynamically request from local machine (login/password is supported)
|
|
/// 'unix://wstunnel.sock:g.com:443' => listen on server for incoming data from unix socket of path wstunnel.sock and forward to g.com:443 from local machine
|
|
#[arg(short='R', long, value_name = "{tcp,udp,socks5,unix}://[BIND:]PORT:HOST:PORT", value_parser = parse_reverse_tunnel_arg, verbatim_doc_comment)]
|
|
remote_to_local: Vec<LocalToRemote>,
|
|
|
|
/// (linux only) Mark network packet with SO_MARK sockoption with the specified value.
|
|
/// You need to use {root, sudo, capabilities} to run wstunnel when using this option
|
|
#[arg(long, value_name = "INT", verbatim_doc_comment)]
|
|
socket_so_mark: Option<u32>,
|
|
|
|
/// Client will maintain a pool of open connection to the server, in order to speed up the connection process.
|
|
/// This option set the maximum number of connection that will be kept open.
|
|
/// This is useful if you plan to create/destroy a lot of tunnel (i.e: with socks5 to navigate with a browser)
|
|
/// It will avoid the latency of doing tcp + tls handshake with the server
|
|
#[arg(short = 'c', long, value_name = "INT", default_value = "0", verbatim_doc_comment)]
|
|
connection_min_idle: u32,
|
|
|
|
/// The maximum of time in seconds while we are going to try to connect to the server before failing the connection/tunnel request
|
|
#[arg(long, value_name = "DURATION_IN_SECONDS", default_value = "300", value_parser = parse_duration_sec, verbatim_doc_comment)]
|
|
connection_retry_max_backoff_sec: Duration,
|
|
|
|
/// Domain name that will be used as SNI during TLS handshake
|
|
/// Warning: If you are behind a CDN (i.e: Cloudflare) you must set this domain also in the http HOST header.
|
|
/// or it will be flagged as fishy and your request rejected
|
|
#[arg(long, value_name = "DOMAIN_NAME", value_parser = parse_sni_override, verbatim_doc_comment)]
|
|
tls_sni_override: Option<DnsName<'static>>,
|
|
|
|
/// Disable sending SNI during TLS handshake
|
|
/// Warning: Most reverse proxies rely on it
|
|
#[arg(long, verbatim_doc_comment)]
|
|
tls_sni_disable: bool,
|
|
|
|
/// Enable TLS certificate verification.
|
|
/// Disabled by default. The client will happily connect to any server with self-signed certificate.
|
|
#[arg(long, verbatim_doc_comment)]
|
|
tls_verify_certificate: bool,
|
|
|
|
/// If set, will use this http proxy to connect to the server
|
|
#[arg(
|
|
short = 'p',
|
|
long,
|
|
value_name = "USER:PASS@HOST:PORT",
|
|
verbatim_doc_comment,
|
|
env = "HTTP_PROXY"
|
|
)]
|
|
http_proxy: Option<String>,
|
|
|
|
/// If set, will use this login to connect to the http proxy. Override the one from --http-proxy
|
|
#[arg(long, value_name = "LOGIN", verbatim_doc_comment, env = "WSTUNNEL_HTTP_PROXY_LOGIN")]
|
|
http_proxy_login: Option<String>,
|
|
|
|
/// If set, will use this password to connect to the http proxy. Override the one from --http-proxy
|
|
#[arg(
|
|
long,
|
|
value_name = "PASSWORD",
|
|
verbatim_doc_comment,
|
|
env = "WSTUNNEL_HTTP_PROXY_PASSWORD"
|
|
)]
|
|
http_proxy_password: Option<String>,
|
|
|
|
/// Use a specific prefix that will show up in the http path during the upgrade request.
|
|
/// Useful if you need to route requests server side but don't have vhosts
|
|
/// When using mTLS this option overrides the default behavior of using the common name of the
|
|
/// client's certificate. This will likely result in the wstunnel server rejecting the connection.
|
|
#[arg(
|
|
short = 'P',
|
|
long,
|
|
default_value = DEFAULT_CLIENT_UPGRADE_PATH_PREFIX,
|
|
verbatim_doc_comment,
|
|
env = "WSTUNNEL_HTTP_UPGRADE_PATH_PREFIX"
|
|
)]
|
|
http_upgrade_path_prefix: String,
|
|
|
|
/// Pass authorization header with basic auth credentials during the upgrade request.
|
|
/// If you need more customization, you can use the http_headers option.
|
|
#[arg(long, value_name = "USER[:PASS]", value_parser = parse_http_credentials, verbatim_doc_comment)]
|
|
http_upgrade_credentials: Option<HeaderValue>,
|
|
|
|
/// Frequency at which the client will send websocket pings to the server.
|
|
/// Set to zero to disable.
|
|
#[arg(long, value_name = "seconds", default_value = "30", value_parser = parse_duration_sec, verbatim_doc_comment)]
|
|
websocket_ping_frequency_sec: Option<Duration>,
|
|
|
|
/// Enable the masking of websocket frames. Default is false
|
|
/// Enable this option only if you use unsecure (non TLS) websocket server, and you see some issues. Otherwise, it is just overhead.
|
|
#[arg(long, default_value = "false", verbatim_doc_comment)]
|
|
websocket_mask_frame: bool,
|
|
|
|
/// Send custom headers in the upgrade request
|
|
/// Can be specified multiple time
|
|
#[arg(short='H', long, value_name = "HEADER_NAME: HEADER_VALUE", value_parser = parse_http_headers, verbatim_doc_comment)]
|
|
http_headers: Vec<(HeaderName, HeaderValue)>,
|
|
|
|
/// Send custom headers in the upgrade request reading them from a file.
|
|
/// It overrides http_headers specified from command line.
|
|
/// File is read everytime and file format must contain lines with `HEADER_NAME: HEADER_VALUE`
|
|
#[arg(long, value_name = "FILE_PATH", verbatim_doc_comment)]
|
|
http_headers_file: Option<PathBuf>,
|
|
|
|
/// Address of the wstunnel server
|
|
/// You can either use websocket or http2 as transport protocol. Use websocket if you are unsure.
|
|
/// Example: For websocket with TLS wss://wstunnel.example.com or without ws://wstunnel.example.com
|
|
/// For http2 with TLS https://wstunnel.example.com or without http://wstunnel.example.com
|
|
///
|
|
/// *WARNING* HTTP2 as transport protocol is harder to make it works because:
|
|
/// - If you are behind a (reverse) proxy/CDN they are going to buffer the whole request before forwarding it to the server
|
|
/// Obviously, this is not going to work for tunneling traffic
|
|
/// - if you have wstunnel behind a reverse proxy, most of them (i.e: nginx) are going to turn http2 request into http1
|
|
/// This is not going to work, because http1 does not support streaming naturally
|
|
/// - The only way to make it works with http2 is to have wstunnel directly exposed to the internet without any reverse proxy in front of it
|
|
#[arg(value_name = "ws[s]|http[s]://wstunnel.server.com[:port]", value_parser = parse_server_url, verbatim_doc_comment)]
|
|
remote_addr: Url,
|
|
|
|
/// [Optional] Certificate (pem) to present to the server when connecting over TLS (HTTPS).
|
|
/// Used when the server requires clients to authenticate themselves with a certificate (i.e. mTLS).
|
|
/// Unless overridden, the HTTP upgrade path will be configured to be the common name (CN) of the certificate.
|
|
/// The certificate will be automatically reloaded if it changes
|
|
#[arg(long, value_name = "FILE_PATH", verbatim_doc_comment)]
|
|
tls_certificate: Option<PathBuf>,
|
|
|
|
/// [Optional] The private key for the corresponding certificate used with mTLS.
|
|
/// The certificate will be automatically reloaded if it changes
|
|
#[arg(long, value_name = "FILE_PATH", verbatim_doc_comment)]
|
|
tls_private_key: Option<PathBuf>,
|
|
|
|
/// Dns resolver to use to lookup ips of domain name. Can be specified multiple time
|
|
/// Example:
|
|
/// dns://1.1.1.1 for using udp
|
|
/// dns+https://1.1.1.1?sni=cloudflare-dns.com for using dns over HTTPS
|
|
/// dns+tls://8.8.8.8?sni=dns.google for using dns over TLS
|
|
/// For Dns over HTTPS/TLS if an HTTP proxy is configured, it will be used also
|
|
/// To use libc resolver, use
|
|
/// system://0.0.0.0
|
|
///
|
|
/// **WARN** On windows you may want to specify explicitly the DNS resolver to avoid excessive DNS queries
|
|
#[arg(long, verbatim_doc_comment)]
|
|
dns_resolver: Vec<Url>,
|
|
|
|
/// Enable if you prefer the dns resolver to prioritize IPv4 over IPv6
|
|
/// This is useful if you have a broken IPv6 connection, and want to avoid the delay of trying to connect to IPv6
|
|
/// If you don't have any IPv6 this does not change anything.
|
|
#[arg(
|
|
long,
|
|
default_value = "false",
|
|
env = "WSTUNNEL_DNS_PREFER_IPV4",
|
|
verbatim_doc_comment
|
|
)]
|
|
dns_resolver_prefer_ipv4: bool,
|
|
}
|
|
|
|
#[derive(clap::Args, Debug)]
|
|
struct Server {
|
|
/// Address of the wstunnel server to bind to
|
|
/// Example: With TLS wss://0.0.0.0:8080 or without ws://[::]:8080
|
|
///
|
|
/// The server is capable of detecting by itself if the request is websocket or http2. So you don't need to specify it.
|
|
#[arg(value_name = "ws[s]://0.0.0.0[:port]", value_parser = parse_server_url, verbatim_doc_comment)]
|
|
remote_addr: Url,
|
|
|
|
/// (linux only) Mark network packet with SO_MARK sockoption with the specified value.
|
|
/// You need to use {root, sudo, capabilities} to run wstunnel when using this option
|
|
#[arg(long, value_name = "INT", verbatim_doc_comment)]
|
|
socket_so_mark: Option<u32>,
|
|
|
|
/// Frequency at which the server will send websocket ping to client.
|
|
/// Set to zero to disable.
|
|
#[arg(long, value_name = "seconds", default_value = "30", value_parser = parse_duration_sec, verbatim_doc_comment)]
|
|
websocket_ping_frequency_sec: Option<Duration>,
|
|
|
|
/// Enable the masking of websocket frames. Default is false
|
|
/// Enable this option only if you use unsecure (non TLS) websocket server, and you see some issues. Otherwise, it is just overhead.
|
|
#[arg(long, default_value = "false", verbatim_doc_comment)]
|
|
websocket_mask_frame: bool,
|
|
|
|
/// Dns resolver to use to lookup ips of domain name
|
|
/// This option is not going to work if you use transparent proxy
|
|
/// Can be specified multiple time
|
|
/// Example:
|
|
/// dns://1.1.1.1 for using udp
|
|
/// dns+https://1.1.1.1?sni=cloudflare-dns.com for using dns over HTTPS
|
|
/// dns+tls://8.8.8.8?sni=dns.google for using dns over TLS
|
|
/// To use libc resolver, use
|
|
/// system://0.0.0.0
|
|
#[arg(long, verbatim_doc_comment)]
|
|
dns_resolver: Vec<Url>,
|
|
|
|
/// Enable if you prefer the dns resolver to prioritize IPv4 over IPv6
|
|
/// This is useful if you have a broken IPv6 connection, and want to avoid the delay of trying to connect to IPv6
|
|
/// If you don't have any IPv6 this does not change anything.
|
|
#[arg(
|
|
long,
|
|
default_value = "false",
|
|
env = "WSTUNNEL_DNS_PREFER_IPV4",
|
|
verbatim_doc_comment
|
|
)]
|
|
dns_resolver_prefer_ipv4: bool,
|
|
|
|
/// Server will only accept connection from the specified tunnel information.
|
|
/// Can be specified multiple time
|
|
/// Example: --restrict-to "google.com:443" --restrict-to "localhost:22"
|
|
#[arg(
|
|
long,
|
|
value_name = "DEST:PORT",
|
|
verbatim_doc_comment,
|
|
conflicts_with = "restrict_config"
|
|
)]
|
|
restrict_to: Option<Vec<String>>,
|
|
|
|
/// Server will only accept connection from if this specific path prefix is used during websocket upgrade.
|
|
/// Useful if you specify in the client a custom path prefix, and you want the server to only allow this one.
|
|
/// The path prefix act as a secret to authenticate clients
|
|
/// Disabled by default. Accept all path prefix. Can be specified multiple time
|
|
#[arg(
|
|
short = 'r',
|
|
long,
|
|
verbatim_doc_comment,
|
|
conflicts_with = "restrict_config",
|
|
env = "WSTUNNEL_RESTRICT_HTTP_UPGRADE_PATH_PREFIX"
|
|
)]
|
|
restrict_http_upgrade_path_prefix: Option<Vec<String>>,
|
|
|
|
/// Path to the location of the restriction yaml config file.
|
|
/// Restriction file is automatically reloaded if it changes
|
|
#[arg(long, verbatim_doc_comment)]
|
|
restrict_config: Option<PathBuf>,
|
|
|
|
/// [Optional] Use custom certificate (pem) instead of the default embedded self-signed certificate.
|
|
/// The certificate will be automatically reloaded if it changes
|
|
#[arg(long, value_name = "FILE_PATH", verbatim_doc_comment)]
|
|
tls_certificate: Option<PathBuf>,
|
|
|
|
/// [Optional] Use a custom tls key (pem, ec, rsa) that the server will use instead of the default embedded one
|
|
/// The private key will be automatically reloaded if it changes
|
|
#[arg(long, value_name = "FILE_PATH", verbatim_doc_comment)]
|
|
tls_private_key: Option<PathBuf>,
|
|
|
|
/// [Optional] Enables mTLS (client authentication with certificate). Argument must be PEM file
|
|
/// containing one or more certificates of CA's of which the certificate of clients needs to be signed with.
|
|
/// The ca will be automatically reloaded if it changes
|
|
#[arg(long, value_name = "FILE_PATH", verbatim_doc_comment)]
|
|
tls_client_ca_certs: Option<PathBuf>,
|
|
|
|
/// If set, will use this http proxy to connect to the client
|
|
#[arg(
|
|
short = 'p',
|
|
long,
|
|
value_name = "USER:PASS@HOST:PORT",
|
|
verbatim_doc_comment,
|
|
env = "HTTP_PROXY"
|
|
)]
|
|
http_proxy: Option<String>,
|
|
|
|
/// If set, will use this login to connect to the http proxy. Override the one from --http-proxy
|
|
#[arg(long, value_name = "LOGIN", verbatim_doc_comment, env = "WSTUNNEL_HTTP_PROXY_LOGIN")]
|
|
http_proxy_login: Option<String>,
|
|
|
|
/// If set, will use this password to connect to the http proxy. Override the one from --http-proxy
|
|
#[arg(
|
|
long,
|
|
value_name = "PASSWORD",
|
|
verbatim_doc_comment,
|
|
env = "WSTUNNEL_HTTP_PROXY_PASSWORD"
|
|
)]
|
|
http_proxy_password: Option<String>,
|
|
}
|
|
|
|
#[derive(Clone, Debug)]
|
|
pub struct LocalToRemote {
|
|
local_protocol: LocalProtocol,
|
|
local: SocketAddr,
|
|
remote: (Host, u16),
|
|
}
|
|
|
|
fn parse_duration_sec(arg: &str) -> Result<Duration, io::Error> {
|
|
use std::io::Error;
|
|
|
|
let Ok(secs) = arg.parse::<u64>() else {
|
|
return Err(Error::new(
|
|
ErrorKind::InvalidInput,
|
|
format!("cannot duration of seconds from {}", arg),
|
|
));
|
|
};
|
|
|
|
Ok(Duration::from_secs(secs))
|
|
}
|
|
|
|
fn parse_local_bind(arg: &str) -> Result<(SocketAddr, &str), io::Error> {
|
|
use std::io::Error;
|
|
|
|
let (bind, remaining) = if arg.starts_with('[') {
|
|
// ipv6 bind
|
|
let Some((ipv6_str, remaining)) = arg.split_once(']') else {
|
|
return Err(Error::new(
|
|
ErrorKind::InvalidInput,
|
|
format!("cannot parse IPv6 bind from {}", arg),
|
|
));
|
|
};
|
|
let Ok(ipv6_addr) = Ipv6Addr::from_str(&ipv6_str[1..]) else {
|
|
return Err(Error::new(
|
|
ErrorKind::InvalidInput,
|
|
format!("cannot parse IPv6 bind from {}", ipv6_str),
|
|
));
|
|
};
|
|
|
|
(IpAddr::V6(ipv6_addr), remaining)
|
|
} else {
|
|
// Maybe ipv4 addr
|
|
let (ipv4_str, remaining) = arg.split_once(':').unwrap_or((arg, ""));
|
|
Ipv4Addr::from_str(ipv4_str).map_or_else(
|
|
|_| (IpAddr::V4(Ipv4Addr::from_str("127.0.0.1").unwrap()), arg),
|
|
|ip4_addr| (IpAddr::V4(ip4_addr), remaining),
|
|
)
|
|
};
|
|
|
|
let remaining = remaining.trim_start_matches(':');
|
|
let (port_str, remaining) = remaining.split_once([':', '?']).unwrap_or((remaining, ""));
|
|
|
|
let Ok(bind_port): Result<u16, _> = port_str.parse() else {
|
|
return Err(Error::new(
|
|
ErrorKind::InvalidInput,
|
|
format!("cannot parse bind port from {}", port_str),
|
|
));
|
|
};
|
|
|
|
Ok((SocketAddr::new(bind, bind_port), remaining))
|
|
}
|
|
|
|
#[allow(clippy::type_complexity)]
|
|
fn parse_tunnel_dest(remaining: &str) -> Result<(Host<String>, u16, BTreeMap<String, String>), io::Error> {
|
|
use std::io::Error;
|
|
|
|
let Ok(remote) = Url::parse(&format!("fake://{}", remaining)) else {
|
|
return Err(Error::new(
|
|
ErrorKind::InvalidInput,
|
|
format!("cannot parse remote from {}", remaining),
|
|
));
|
|
};
|
|
|
|
let Some(remote_host) = remote.host() else {
|
|
return Err(Error::new(
|
|
ErrorKind::InvalidInput,
|
|
format!("cannot parse remote host from {}", remaining),
|
|
));
|
|
};
|
|
|
|
let Some(remote_port) = remote.port() else {
|
|
return Err(Error::new(
|
|
ErrorKind::InvalidInput,
|
|
format!("cannot parse remote port from {}", remaining),
|
|
));
|
|
};
|
|
|
|
let options: BTreeMap<String, String> = remote.query_pairs().into_owned().collect();
|
|
Ok((remote_host.to_owned(), remote_port, options))
|
|
}
|
|
|
|
fn parse_tunnel_arg(arg: &str) -> Result<LocalToRemote, io::Error> {
|
|
use std::io::Error;
|
|
let get_timeout = |options: &BTreeMap<String, String>| {
|
|
options
|
|
.get("timeout_sec")
|
|
.and_then(|x| x.parse::<u64>().ok())
|
|
.map(|d| if d == 0 { None } else { Some(Duration::from_secs(d)) })
|
|
.unwrap_or(Some(Duration::from_secs(30)))
|
|
};
|
|
let get_credentials = |options: &BTreeMap<String, String>| {
|
|
options
|
|
.get("login")
|
|
.and_then(|login| options.get("password").map(|p| (login.to_string(), p.to_string())))
|
|
};
|
|
let get_proxy_protocol = |options: &BTreeMap<String, String>| options.contains_key("proxy_protocol");
|
|
|
|
let Some((proto, tunnel_info)) = arg.split_once("://") else {
|
|
return Err(Error::new(
|
|
ErrorKind::InvalidInput,
|
|
format!("cannot parse protocol from {}", arg),
|
|
));
|
|
};
|
|
|
|
match proto {
|
|
"tcp" => {
|
|
let (local_bind, remaining) = parse_local_bind(tunnel_info)?;
|
|
let (dest_host, dest_port, options) = parse_tunnel_dest(remaining)?;
|
|
Ok(LocalToRemote {
|
|
local_protocol: LocalProtocol::Tcp {
|
|
proxy_protocol: get_proxy_protocol(&options),
|
|
},
|
|
local: local_bind,
|
|
remote: (dest_host, dest_port),
|
|
})
|
|
}
|
|
"udp" => {
|
|
let (local_bind, remaining) = parse_local_bind(tunnel_info)?;
|
|
let (dest_host, dest_port, options) = parse_tunnel_dest(remaining)?;
|
|
|
|
Ok(LocalToRemote {
|
|
local_protocol: LocalProtocol::Udp {
|
|
timeout: get_timeout(&options),
|
|
},
|
|
local: local_bind,
|
|
remote: (dest_host, dest_port),
|
|
})
|
|
}
|
|
"unix" => {
|
|
let Some((path, remote)) = tunnel_info.split_once(':') else {
|
|
return Err(Error::new(
|
|
ErrorKind::InvalidInput,
|
|
format!("cannot parse unix socket path from {}", arg),
|
|
));
|
|
};
|
|
let (dest_host, dest_port, options) = parse_tunnel_dest(remote)?;
|
|
Ok(LocalToRemote {
|
|
local_protocol: LocalProtocol::Unix {
|
|
path: PathBuf::from(path),
|
|
proxy_protocol: get_proxy_protocol(&options),
|
|
},
|
|
local: SocketAddr::V6(SocketAddrV6::new(Ipv6Addr::UNSPECIFIED, 0, 0, 0)),
|
|
remote: (dest_host, dest_port),
|
|
})
|
|
}
|
|
"http" => {
|
|
let (local_bind, remaining) = parse_local_bind(tunnel_info)?;
|
|
let x = format!("0.0.0.0:0?{}", remaining);
|
|
let (dest_host, dest_port, options) = parse_tunnel_dest(&x)?;
|
|
Ok(LocalToRemote {
|
|
local_protocol: LocalProtocol::HttpProxy {
|
|
timeout: get_timeout(&options),
|
|
credentials: get_credentials(&options),
|
|
proxy_protocol: get_proxy_protocol(&options),
|
|
},
|
|
local: local_bind,
|
|
remote: (dest_host, dest_port),
|
|
})
|
|
}
|
|
"socks5" => {
|
|
let (local_bind, remaining) = parse_local_bind(tunnel_info)?;
|
|
let x = format!("0.0.0.0:0?{}", remaining);
|
|
let (dest_host, dest_port, options) = parse_tunnel_dest(&x)?;
|
|
Ok(LocalToRemote {
|
|
local_protocol: LocalProtocol::Socks5 {
|
|
timeout: get_timeout(&options),
|
|
credentials: get_credentials(&options),
|
|
},
|
|
local: local_bind,
|
|
remote: (dest_host, dest_port),
|
|
})
|
|
}
|
|
"stdio" => {
|
|
let (dest_host, dest_port, options) = parse_tunnel_dest(tunnel_info)?;
|
|
Ok(LocalToRemote {
|
|
local_protocol: LocalProtocol::Stdio {
|
|
proxy_protocol: get_proxy_protocol(&options),
|
|
},
|
|
local: SocketAddr::V4(SocketAddrV4::new(Ipv4Addr::from(0), 0)),
|
|
remote: (dest_host, dest_port),
|
|
})
|
|
}
|
|
"tproxy+tcp" => {
|
|
let (local_bind, remaining) = parse_local_bind(tunnel_info)?;
|
|
let x = format!("0.0.0.0:0?{}", remaining);
|
|
let (dest_host, dest_port, _options) = parse_tunnel_dest(&x)?;
|
|
Ok(LocalToRemote {
|
|
local_protocol: LocalProtocol::TProxyTcp,
|
|
local: local_bind,
|
|
remote: (dest_host, dest_port),
|
|
})
|
|
}
|
|
"tproxy+udp" => {
|
|
let (local_bind, remaining) = parse_local_bind(tunnel_info)?;
|
|
let x = format!("0.0.0.0:0?{}", remaining);
|
|
let (dest_host, dest_port, options) = parse_tunnel_dest(&x)?;
|
|
Ok(LocalToRemote {
|
|
local_protocol: LocalProtocol::TProxyUdp {
|
|
timeout: get_timeout(&options),
|
|
},
|
|
local: local_bind,
|
|
remote: (dest_host, dest_port),
|
|
})
|
|
}
|
|
_ => Err(Error::new(
|
|
ErrorKind::InvalidInput,
|
|
format!("Invalid local protocol for tunnel {}", arg),
|
|
)),
|
|
}
|
|
}
|
|
|
|
fn parse_reverse_tunnel_arg(arg: &str) -> Result<LocalToRemote, io::Error> {
|
|
let proto = parse_tunnel_arg(arg)?;
|
|
let local_protocol = match proto.local_protocol {
|
|
LocalProtocol::Tcp { .. } => LocalProtocol::ReverseTcp {},
|
|
LocalProtocol::Udp { timeout } => LocalProtocol::ReverseUdp { timeout },
|
|
LocalProtocol::Socks5 { timeout, credentials } => LocalProtocol::ReverseSocks5 { timeout, credentials },
|
|
LocalProtocol::HttpProxy {
|
|
timeout,
|
|
credentials,
|
|
proxy_protocol: _proxy_protocol,
|
|
} => LocalProtocol::ReverseHttpProxy { timeout, credentials },
|
|
LocalProtocol::Unix { path, .. } => LocalProtocol::ReverseUnix { path },
|
|
LocalProtocol::ReverseTcp { .. }
|
|
| LocalProtocol::ReverseUdp { .. }
|
|
| LocalProtocol::ReverseSocks5 { .. }
|
|
| LocalProtocol::ReverseHttpProxy { .. }
|
|
| LocalProtocol::ReverseUnix { .. }
|
|
| LocalProtocol::TProxyTcp
|
|
| LocalProtocol::TProxyUdp { .. }
|
|
| LocalProtocol::Stdio { .. } => {
|
|
return Err(io::Error::new(
|
|
ErrorKind::InvalidInput,
|
|
format!("Cannot use {:?} as reverse tunnels {}", proto.local_protocol, arg),
|
|
))
|
|
}
|
|
};
|
|
|
|
Ok(LocalToRemote {
|
|
local_protocol,
|
|
local: proto.local,
|
|
remote: proto.remote,
|
|
})
|
|
}
|
|
|
|
fn parse_sni_override(arg: &str) -> Result<DnsName<'static>, io::Error> {
|
|
match DnsName::try_from(arg.to_string()) {
|
|
Ok(val) => Ok(val),
|
|
Err(err) => Err(io::Error::new(
|
|
ErrorKind::InvalidInput,
|
|
format!("Invalid sni override: {}", err),
|
|
)),
|
|
}
|
|
}
|
|
|
|
fn parse_http_headers(arg: &str) -> Result<(HeaderName, HeaderValue), io::Error> {
|
|
let Some((key, value)) = arg.split_once(':') else {
|
|
return Err(io::Error::new(
|
|
ErrorKind::InvalidInput,
|
|
format!("cannot parse http header from {}", arg),
|
|
));
|
|
};
|
|
|
|
let value = match HeaderValue::from_str(value.trim()) {
|
|
Ok(value) => value,
|
|
Err(err) => {
|
|
return Err(io::Error::new(
|
|
ErrorKind::InvalidInput,
|
|
format!("cannot parse http header value from {} due to {:?}", value, err),
|
|
))
|
|
}
|
|
};
|
|
|
|
Ok((HeaderName::from_str(key).unwrap(), value))
|
|
}
|
|
|
|
fn parse_http_credentials(arg: &str) -> Result<HeaderValue, io::Error> {
|
|
let encoded = base64::engine::general_purpose::STANDARD.encode(arg.trim().as_bytes());
|
|
let Ok(header) = HeaderValue::from_str(&format!("Basic {}", encoded)) else {
|
|
return Err(io::Error::new(
|
|
ErrorKind::InvalidInput,
|
|
format!("cannot parse http credentials {}", arg),
|
|
));
|
|
};
|
|
|
|
Ok(header)
|
|
}
|
|
|
|
fn parse_server_url(arg: &str) -> Result<Url, io::Error> {
|
|
let Ok(url) = Url::parse(arg) else {
|
|
return Err(io::Error::new(
|
|
ErrorKind::InvalidInput,
|
|
format!("cannot parse server url {}", arg),
|
|
));
|
|
};
|
|
|
|
if !TransportScheme::values().iter().any(|x| x.to_str() == url.scheme()) {
|
|
return Err(io::Error::new(
|
|
ErrorKind::InvalidInput,
|
|
format!("invalid scheme {}", url.scheme()),
|
|
));
|
|
}
|
|
|
|
if url.host().is_none() {
|
|
return Err(io::Error::new(ErrorKind::InvalidInput, format!("invalid server host {}", arg)));
|
|
}
|
|
|
|
Ok(url)
|
|
}
|
|
|
|
#[tokio::main]
|
|
async fn main() -> anyhow::Result<()> {
|
|
let args = Wstunnel::parse();
|
|
|
|
// Setup logging
|
|
let mut env_filter = EnvFilter::builder().parse(&args.log_lvl).expect("Invalid log level");
|
|
if !(args.log_lvl.contains("h2::") || args.log_lvl.contains("h2=")) {
|
|
env_filter = env_filter.add_directive(Directive::from_str("h2::codec=off").expect("Invalid log directive"));
|
|
}
|
|
let logger = tracing_subscriber::fmt()
|
|
.with_ansi(args.no_color.is_none())
|
|
.with_env_filter(env_filter);
|
|
|
|
// stdio tunnel capture stdio, so need to log into stderr
|
|
if let Commands::Client(args) = &args.commands {
|
|
if args
|
|
.local_to_remote
|
|
.iter()
|
|
.filter(|x| matches!(x.local_protocol, LocalProtocol::Stdio { .. }))
|
|
.count()
|
|
> 0
|
|
{
|
|
logger.with_writer(io::stderr).init();
|
|
} else {
|
|
logger.init()
|
|
}
|
|
} else {
|
|
logger.init();
|
|
};
|
|
|
|
match args.commands {
|
|
Commands::Client(args) => {
|
|
let (tls_certificate, tls_key) = if let (Some(cert), Some(key)) =
|
|
(args.tls_certificate.as_ref(), args.tls_private_key.as_ref())
|
|
{
|
|
let tls_certificate =
|
|
tls::load_certificates_from_pem(cert).expect("Cannot load client TLS certificate (mTLS)");
|
|
let tls_key = tls::load_private_key_from_file(key).expect("Cannot load client TLS private key (mTLS)");
|
|
(Some(tls_certificate), Some(tls_key))
|
|
} else {
|
|
(None, None)
|
|
};
|
|
|
|
let http_upgrade_path_prefix = if args.http_upgrade_path_prefix.eq(DEFAULT_CLIENT_UPGRADE_PATH_PREFIX) {
|
|
// When using mTLS and no manual http upgrade path is specified configure the HTTP upgrade path
|
|
// to be the common name (CN) of the client's certificate.
|
|
tls_certificate
|
|
.as_ref()
|
|
.and_then(|certs| tls::find_leaf_certificate(certs.as_slice()))
|
|
.and_then(|leaf_cert| tls::cn_from_certificate(&leaf_cert))
|
|
.unwrap_or(args.http_upgrade_path_prefix)
|
|
} else {
|
|
args.http_upgrade_path_prefix
|
|
};
|
|
|
|
let transport_scheme =
|
|
TransportScheme::from_str(args.remote_addr.scheme()).expect("invalid scheme in server url");
|
|
let tls = match transport_scheme {
|
|
TransportScheme::Ws | TransportScheme::Http => None,
|
|
TransportScheme::Wss | TransportScheme::Https => Some(TlsClientConfig {
|
|
tls_connector: Arc::new(RwLock::new(
|
|
tls::tls_connector(
|
|
args.tls_verify_certificate,
|
|
transport_scheme.alpn_protocols(),
|
|
!args.tls_sni_disable,
|
|
tls_certificate,
|
|
tls_key,
|
|
)
|
|
.expect("Cannot create tls connector"),
|
|
)),
|
|
tls_sni_override: args.tls_sni_override,
|
|
tls_verify_certificate: args.tls_verify_certificate,
|
|
tls_sni_disabled: args.tls_sni_disable,
|
|
tls_certificate_path: args.tls_certificate.clone(),
|
|
tls_key_path: args.tls_private_key.clone(),
|
|
}),
|
|
};
|
|
|
|
// Extract host header from http_headers
|
|
let host_header = if let Some((_, host_val)) = args.http_headers.iter().find(|(h, _)| *h == HOST) {
|
|
host_val.clone()
|
|
} else {
|
|
let host = match args.remote_addr.port_or_known_default() {
|
|
None | Some(80) | Some(443) => args.remote_addr.host().unwrap().to_string(),
|
|
Some(port) => format!("{}:{}", args.remote_addr.host().unwrap(), port),
|
|
};
|
|
HeaderValue::from_str(&host).unwrap()
|
|
};
|
|
if let Some(path) = &args.http_headers_file {
|
|
if !path.exists() {
|
|
panic!("http headers file does not exists: {}", path.display());
|
|
}
|
|
}
|
|
|
|
let http_proxy = mk_http_proxy(args.http_proxy, args.http_proxy_login, args.http_proxy_password)?;
|
|
let client_config = WsClientConfig {
|
|
remote_addr: TransportAddr::new(
|
|
TransportScheme::from_str(args.remote_addr.scheme()).unwrap(),
|
|
args.remote_addr.host().unwrap().to_owned(),
|
|
args.remote_addr.port_or_known_default().unwrap(),
|
|
tls,
|
|
)
|
|
.unwrap(),
|
|
socket_so_mark: args.socket_so_mark,
|
|
http_upgrade_path_prefix,
|
|
http_upgrade_credentials: args.http_upgrade_credentials,
|
|
http_headers: args.http_headers.into_iter().filter(|(k, _)| k != HOST).collect(),
|
|
http_headers_file: args.http_headers_file,
|
|
http_header_host: host_header,
|
|
timeout_connect: Duration::from_secs(10),
|
|
websocket_ping_frequency: args
|
|
.websocket_ping_frequency_sec
|
|
.or(Some(Duration::from_secs(30)))
|
|
.filter(|d| d.as_secs() > 0),
|
|
websocket_mask_frame: args.websocket_mask_frame,
|
|
dns_resolver: DnsResolver::new_from_urls(
|
|
&args.dns_resolver,
|
|
http_proxy.clone(),
|
|
args.socket_so_mark,
|
|
!args.dns_resolver_prefer_ipv4,
|
|
)
|
|
.expect("cannot create dns resolver"),
|
|
http_proxy,
|
|
};
|
|
|
|
let client =
|
|
WsClient::new(client_config, args.connection_min_idle, args.connection_retry_max_backoff_sec).await?;
|
|
|
|
// Start tunnels
|
|
for tunnel in args.remote_to_local.into_iter() {
|
|
let client = client.clone();
|
|
match &tunnel.local_protocol {
|
|
LocalProtocol::ReverseTcp { .. } => {
|
|
tokio::spawn(async move {
|
|
let cfg = client.config.clone();
|
|
let tcp_connector = TcpTunnelConnector::new(
|
|
&tunnel.remote.0,
|
|
tunnel.remote.1,
|
|
cfg.socket_so_mark,
|
|
cfg.timeout_connect,
|
|
&cfg.dns_resolver,
|
|
);
|
|
let (host, port) = to_host_port(tunnel.local);
|
|
let remote = RemoteAddr {
|
|
protocol: LocalProtocol::ReverseTcp,
|
|
host,
|
|
port,
|
|
};
|
|
if let Err(err) = client.run_reverse_tunnel(remote, tcp_connector).await {
|
|
error!("{:?}", err);
|
|
}
|
|
});
|
|
}
|
|
LocalProtocol::ReverseUdp { timeout } => {
|
|
let timeout = *timeout;
|
|
|
|
tokio::spawn(async move {
|
|
let cfg = client.config.clone();
|
|
let (host, port) = to_host_port(tunnel.local);
|
|
let remote = RemoteAddr {
|
|
protocol: LocalProtocol::ReverseUdp { timeout },
|
|
host,
|
|
port,
|
|
};
|
|
let udp_connector = UdpTunnelConnector::new(
|
|
&remote.host,
|
|
remote.port,
|
|
cfg.socket_so_mark,
|
|
cfg.timeout_connect,
|
|
&cfg.dns_resolver,
|
|
);
|
|
|
|
if let Err(err) = client.run_reverse_tunnel(remote.clone(), udp_connector).await {
|
|
error!("{:?}", err);
|
|
}
|
|
});
|
|
}
|
|
LocalProtocol::ReverseSocks5 { timeout, credentials } => {
|
|
let credentials = credentials.clone();
|
|
let timeout = *timeout;
|
|
tokio::spawn(async move {
|
|
let cfg = client.config.clone();
|
|
let (host, port) = to_host_port(tunnel.local);
|
|
let remote = RemoteAddr {
|
|
protocol: LocalProtocol::ReverseSocks5 { timeout, credentials },
|
|
host,
|
|
port,
|
|
};
|
|
let socks_connector =
|
|
Socks5TunnelConnector::new(cfg.socket_so_mark, cfg.timeout_connect, &cfg.dns_resolver);
|
|
|
|
if let Err(err) = client.run_reverse_tunnel(remote, socks_connector).await {
|
|
error!("{:?}", err);
|
|
}
|
|
});
|
|
}
|
|
LocalProtocol::ReverseHttpProxy { timeout, credentials } => {
|
|
let credentials = credentials.clone();
|
|
let timeout = *timeout;
|
|
tokio::spawn(async move {
|
|
let cfg = client.config.clone();
|
|
let (host, port) = to_host_port(tunnel.local);
|
|
let remote = RemoteAddr {
|
|
protocol: LocalProtocol::ReverseHttpProxy { timeout, credentials },
|
|
host,
|
|
port,
|
|
};
|
|
let tcp_connector = TcpTunnelConnector::new(
|
|
&remote.host,
|
|
remote.port,
|
|
cfg.socket_so_mark,
|
|
cfg.timeout_connect,
|
|
&cfg.dns_resolver,
|
|
);
|
|
|
|
if let Err(err) = client.run_reverse_tunnel(remote.clone(), tcp_connector).await {
|
|
error!("{:?}", err);
|
|
}
|
|
});
|
|
}
|
|
LocalProtocol::ReverseUnix { path } => {
|
|
let path = path.clone();
|
|
tokio::spawn(async move {
|
|
let cfg = client.config.clone();
|
|
let tcp_connector = TcpTunnelConnector::new(
|
|
&tunnel.remote.0,
|
|
tunnel.remote.1,
|
|
cfg.socket_so_mark,
|
|
cfg.timeout_connect,
|
|
&cfg.dns_resolver,
|
|
);
|
|
|
|
let (host, port) = to_host_port(tunnel.local);
|
|
let remote = RemoteAddr {
|
|
protocol: LocalProtocol::ReverseUnix { path },
|
|
host,
|
|
port,
|
|
};
|
|
if let Err(err) = client.run_reverse_tunnel(remote, tcp_connector).await {
|
|
error!("{:?}", err);
|
|
}
|
|
});
|
|
}
|
|
LocalProtocol::Stdio { .. }
|
|
| LocalProtocol::TProxyTcp
|
|
| LocalProtocol::TProxyUdp { .. }
|
|
| LocalProtocol::Tcp { .. }
|
|
| LocalProtocol::Udp { .. }
|
|
| LocalProtocol::Socks5 { .. }
|
|
| LocalProtocol::HttpProxy { .. } => {}
|
|
LocalProtocol::Unix { .. } => {
|
|
panic!("Invalid protocol for reverse tunnel");
|
|
}
|
|
}
|
|
}
|
|
|
|
for tunnel in args.local_to_remote.into_iter() {
|
|
let client = client.clone();
|
|
|
|
match &tunnel.local_protocol {
|
|
LocalProtocol::Tcp { proxy_protocol } => {
|
|
let server =
|
|
TcpTunnelListener::new(tunnel.local, tunnel.remote.clone(), *proxy_protocol).await?;
|
|
tokio::spawn(async move {
|
|
if let Err(err) = client.run_tunnel(server).await {
|
|
error!("{:?}", err);
|
|
}
|
|
});
|
|
}
|
|
#[cfg(target_os = "linux")]
|
|
LocalProtocol::TProxyTcp => {
|
|
use crate::tunnel::listeners::TproxyTcpTunnelListener;
|
|
let server = TproxyTcpTunnelListener::new(tunnel.local, false).await?;
|
|
|
|
tokio::spawn(async move {
|
|
if let Err(err) = client.run_tunnel(server).await {
|
|
error!("{:?}", err);
|
|
}
|
|
});
|
|
}
|
|
#[cfg(unix)]
|
|
LocalProtocol::Unix { path, proxy_protocol } => {
|
|
use crate::tunnel::listeners::UnixTunnelListener;
|
|
let server = UnixTunnelListener::new(path, tunnel.remote.clone(), *proxy_protocol).await?;
|
|
tokio::spawn(async move {
|
|
if let Err(err) = client.run_tunnel(server).await {
|
|
error!("{:?}", err);
|
|
}
|
|
});
|
|
}
|
|
#[cfg(not(unix))]
|
|
LocalProtocol::Unix { .. } => {
|
|
panic!("Unix socket is not available for non Unix platform")
|
|
}
|
|
|
|
#[cfg(target_os = "linux")]
|
|
LocalProtocol::TProxyUdp { timeout } => {
|
|
use crate::tunnel::listeners::new_tproxy_udp;
|
|
let server = new_tproxy_udp(tunnel.local, *timeout).await?;
|
|
tokio::spawn(async move {
|
|
if let Err(err) = client.run_tunnel(server).await {
|
|
error!("{:?}", err);
|
|
}
|
|
});
|
|
}
|
|
#[cfg(not(target_os = "linux"))]
|
|
LocalProtocol::TProxyTcp | LocalProtocol::TProxyUdp { .. } => {
|
|
panic!("Transparent proxy is not available for non Linux platform")
|
|
}
|
|
LocalProtocol::Udp { timeout } => {
|
|
let server = UdpTunnelListener::new(tunnel.local, tunnel.remote.clone(), *timeout).await?;
|
|
|
|
tokio::spawn(async move {
|
|
if let Err(err) = client.run_tunnel(server).await {
|
|
error!("{:?}", err);
|
|
}
|
|
});
|
|
}
|
|
LocalProtocol::Socks5 { timeout, credentials } => {
|
|
let server = Socks5TunnelListener::new(tunnel.local, *timeout, credentials.clone()).await?;
|
|
tokio::spawn(async move {
|
|
if let Err(err) = client.run_tunnel(server).await {
|
|
error!("{:?}", err);
|
|
}
|
|
});
|
|
}
|
|
LocalProtocol::HttpProxy {
|
|
timeout,
|
|
credentials,
|
|
proxy_protocol,
|
|
} => {
|
|
let server =
|
|
HttpProxyTunnelListener::new(tunnel.local, *timeout, credentials.clone(), *proxy_protocol)
|
|
.await?;
|
|
tokio::spawn(async move {
|
|
if let Err(err) = client.run_tunnel(server).await {
|
|
error!("{:?}", err);
|
|
}
|
|
});
|
|
}
|
|
|
|
LocalProtocol::Stdio { proxy_protocol } => {
|
|
let (server, mut handle) = new_stdio_listener(tunnel.remote.clone(), *proxy_protocol).await?;
|
|
tokio::spawn(async move {
|
|
if let Err(err) = client.run_tunnel(server).await {
|
|
error!("{:?}", err);
|
|
}
|
|
});
|
|
|
|
// We need to wait for either a ctrl+c of that the stdio tunnel is closed
|
|
// to force exit the program
|
|
select! {
|
|
_ = handle.closed() => {},
|
|
_ = tokio::signal::ctrl_c() => {}
|
|
}
|
|
tokio::time::sleep(Duration::from_secs(1)).await;
|
|
std::process::exit(0);
|
|
}
|
|
LocalProtocol::ReverseTcp => {}
|
|
LocalProtocol::ReverseUdp { .. } => {}
|
|
LocalProtocol::ReverseSocks5 { .. } => {}
|
|
LocalProtocol::ReverseUnix { .. } => {}
|
|
LocalProtocol::ReverseHttpProxy { .. } => {}
|
|
}
|
|
}
|
|
}
|
|
Commands::Server(args) => {
|
|
let tls_config = if args.remote_addr.scheme() == "wss" {
|
|
let tls_certificate = if let Some(cert_path) = &args.tls_certificate {
|
|
tls::load_certificates_from_pem(cert_path).expect("Cannot load tls certificate")
|
|
} else {
|
|
embedded_certificate::TLS_CERTIFICATE.clone()
|
|
};
|
|
|
|
let tls_key = if let Some(key_path) = &args.tls_private_key {
|
|
tls::load_private_key_from_file(key_path).expect("Cannot load tls private key")
|
|
} else {
|
|
embedded_certificate::TLS_PRIVATE_KEY.clone_key()
|
|
};
|
|
|
|
let tls_client_ca_certificates = args.tls_client_ca_certs.as_ref().map(|tls_client_ca| {
|
|
Mutex::new(
|
|
tls::load_certificates_from_pem(tls_client_ca)
|
|
.expect("Cannot load client CA certificate (mTLS)"),
|
|
)
|
|
});
|
|
|
|
Some(TlsServerConfig {
|
|
tls_certificate: Mutex::new(tls_certificate),
|
|
tls_key: Mutex::new(tls_key),
|
|
tls_client_ca_certificates,
|
|
tls_certificate_path: args.tls_certificate,
|
|
tls_key_path: args.tls_private_key,
|
|
tls_client_ca_certs_path: args.tls_client_ca_certs,
|
|
})
|
|
} else {
|
|
None
|
|
};
|
|
|
|
let restrictions = if let Some(path) = &args.restrict_config {
|
|
RestrictionsRules::from_config_file(path).expect("Cannot parse restriction file")
|
|
} else {
|
|
let restrict_to: Vec<(String, u16)> = args
|
|
.restrict_to
|
|
.as_deref()
|
|
.unwrap_or(&[])
|
|
.iter()
|
|
.map(|x| {
|
|
let (host, port) = x.rsplit_once(':').expect("Invalid restrict-to format");
|
|
(
|
|
host.trim_matches(&['[', ']']).to_string(),
|
|
port.parse::<u16>().expect("Invalid restrict-to port format"),
|
|
)
|
|
})
|
|
.collect();
|
|
|
|
let restriction_cfg = RestrictionsRules::from_path_prefix(
|
|
args.restrict_http_upgrade_path_prefix.as_deref().unwrap_or(&[]),
|
|
&restrict_to,
|
|
)
|
|
.expect("Cannot convert restriction rules from path-prefix and restric-to");
|
|
restriction_cfg
|
|
};
|
|
|
|
let http_proxy = mk_http_proxy(args.http_proxy, args.http_proxy_login, args.http_proxy_password)?;
|
|
let server_config = WsServerConfig {
|
|
socket_so_mark: args.socket_so_mark,
|
|
bind: args.remote_addr.socket_addrs(|| Some(8080)).unwrap()[0],
|
|
websocket_ping_frequency: args
|
|
.websocket_ping_frequency_sec
|
|
.or(Some(Duration::from_secs(30)))
|
|
.filter(|d| d.as_secs() > 0),
|
|
timeout_connect: Duration::from_secs(10),
|
|
websocket_mask_frame: args.websocket_mask_frame,
|
|
tls: tls_config,
|
|
dns_resolver: DnsResolver::new_from_urls(
|
|
&args.dns_resolver,
|
|
None,
|
|
args.socket_so_mark,
|
|
!args.dns_resolver_prefer_ipv4,
|
|
)
|
|
.expect("Cannot create DNS resolver"),
|
|
restriction_config: args.restrict_config,
|
|
http_proxy,
|
|
};
|
|
let server = WsServer::new(server_config);
|
|
|
|
info!(
|
|
"Starting wstunnel server v{} with config {:?}",
|
|
env!("CARGO_PKG_VERSION"),
|
|
server.config
|
|
);
|
|
debug!("Restriction rules: {:#?}", restrictions);
|
|
server.serve(restrictions).await.unwrap_or_else(|err| {
|
|
panic!("Cannot start wstunnel server: {:?}", err);
|
|
});
|
|
}
|
|
}
|
|
|
|
tokio::signal::ctrl_c().await.unwrap();
|
|
Ok(())
|
|
}
|
|
|
|
fn mk_http_proxy(
|
|
http_proxy: Option<String>,
|
|
proxy_login: Option<String>,
|
|
proxy_password: Option<String>,
|
|
) -> anyhow::Result<Option<Url>> {
|
|
let Some(proxy) = http_proxy else {
|
|
return Ok(None);
|
|
};
|
|
|
|
let mut proxy = if proxy.starts_with("http://") {
|
|
Url::parse(&proxy).with_context(|| "Invalid http proxy url")?
|
|
} else {
|
|
Url::parse(&format!("http://{}", proxy)).with_context(|| "Invalid http proxy url")?
|
|
};
|
|
|
|
if let Some(login) = proxy_login {
|
|
proxy
|
|
.set_username(login.as_str())
|
|
.map_err(|_| anyhow!("Cannot set http proxy login"))?;
|
|
}
|
|
|
|
if let Some(password) = proxy_password {
|
|
proxy
|
|
.set_password(Some(password.as_str()))
|
|
.map_err(|_| anyhow!("Cannot set http proxy password"))?;
|
|
}
|
|
|
|
Ok(Some(proxy))
|
|
}
|