Merge branch 'master' of ssh://git.coolaj86.com:22042/coolaj86/telebit-relay.js

This commit is contained in:
AJ ONeal 2018-06-23 01:08:19 +00:00
commit 6e60fc1750
7 changed files with 551 additions and 519 deletions

View File

@ -0,0 +1,7 @@
{ "terms_of_service": ":hostname/tos/"
, "api_host": ":hostname"
, "tunnel": {
"method": "wss"
, "pathname": ""
}
}

View File

@ -134,7 +134,7 @@ function applyConfig(config) {
// TODO specify extensions in config file // TODO specify extensions in config file
state.extensions = require('../lib/extensions'); state.extensions = require('../lib/extensions');
} catch(e) { } catch(e) {
if (state.debug) { console.log('[DEBUG] no extensions loaded', e); } if ('ENOENT' !== e.code || state.debug) { console.log('[DEBUG] no extensions loaded', e); }
state.extensions = {}; state.extensions = {};
} }
require('../lib/handlers').create(state); // adds directly to config for now... require('../lib/handlers').create(state); // adds directly to config for now...

View File

@ -52,7 +52,7 @@ module.exports.create = function (state) {
|| redirectHttpsAndClose || redirectHttpsAndClose
); );
state.handleInsecureHttp = function (servername, socket) { state.handleInsecureHttp = function (servername, socket) {
console.log("handleInsecureHttp('" + servername + "', socket)"); console.log("[handlers] insecure http for '" + servername + "'");
socket.__my_servername = servername; socket.__my_servername = servername;
state.httpInsecureServer.emit('connection', socket); state.httpInsecureServer.emit('connection', socket);
}; };

View File

@ -2,42 +2,45 @@
var Packer = require('proxy-packer'); var Packer = require('proxy-packer');
module.exports = function pipeWs(servername, service, conn, remote, serviceport) { module.exports = function pipeWs(servername, service, srv, conn, serviceport) {
var browserAddr = Packer.socketToAddr(conn); var browserAddr = Packer.socketToAddr(conn);
var cid = Packer.addrToId(browserAddr); var cid = Packer.addrToId(browserAddr);
browserAddr.service = service; browserAddr.service = service;
browserAddr.serviceport = serviceport; browserAddr.serviceport = serviceport;
browserAddr.name = servername; browserAddr.name = servername;
conn.tunnelCid = cid; conn.tunnelCid = cid;
var rid = Packer.socketToId(remote.upgradeReq.socket); var rid = Packer.socketToId(srv.upgradeReq.socket);
//if (state.debug) { console.log('[pipeWs] client', cid, '=> remote', rid, 'for', servername, 'via', service); } //if (state.debug) { console.log('[pipeWs] client', cid, '=> remote', rid, 'for', servername, 'via', service); }
function sendWs(data, serviceOverride) { function sendWs(data, serviceOverride) {
if (remote.ws && (!conn.tunnelClosing || serviceOverride)) { if (srv.ws && (!conn.tunnelClosing || serviceOverride)) {
try { try {
remote.ws.send(Packer.pack(browserAddr, data, serviceOverride), { binary: true }); srv.ws.send(Packer.pack(browserAddr, data, serviceOverride), { binary: true });
// If we can't send data over the websocket as fast as this connection can send it to us // If we can't send data over the websocket as fast as this connection can send it to us
// (or there are a lot of connections trying to send over the same websocket) then we // (or there are a lot of connections trying to send over the same websocket) then we
// need to pause the connection for a little. We pause all connections if any are paused // need to pause the connection for a little. We pause all connections if any are paused
// to make things more fair so a connection doesn't get stuck waiting for everyone else // to make things more fair so a connection doesn't get stuck waiting for everyone else
// to finish because it got caught on the boundary. Also if serviceOverride is set it // to finish because it got caught on the boundary. Also if serviceOverride is set it
// means the connection is over, so no need to pause it. // means the connection is over, so no need to pause it.
if (!serviceOverride && (remote.pausedConns.length || remote.ws.bufferedAmount > 1024*1024)) { if (!serviceOverride && (srv.pausedConns.length || srv.ws.bufferedAmount > 1024*1024)) {
// console.log('pausing', cid, 'to allow web socket to catch up'); // console.log('pausing', cid, 'to allow web socket to catch up');
conn.pause(); conn.pause();
remote.pausedConns.push(conn); srv.pausedConns.push(conn);
} }
} catch (err) { } catch (err) {
console.warn('[pipeWs] remote', rid, ' => client', cid, 'error sending websocket message', err); console.warn('[pipeWs] srv', rid, ' => client', cid, 'error sending websocket message', err);
} }
} }
} }
remote.clients[cid] = conn; srv.clients[cid] = conn;
conn.servername = servername;
conn.serviceport = serviceport;
conn.service = service;
conn.on('data', function (chunk) { conn.on('data', function (chunk) {
//if (state.debug) { console.log('[pipeWs] client', cid, ' => remote', rid, chunk.byteLength, 'bytes'); } //if (state.debug) { console.log('[pipeWs] client', cid, ' => srv', rid, chunk.byteLength, 'bytes'); }
sendWs(chunk); sendWs(chunk);
}); });
@ -48,7 +51,7 @@ module.exports = function pipeWs(servername, service, conn, remote, serviceport)
conn.on('close', function (hadErr) { conn.on('close', function (hadErr) {
//if (state.debug) { console.log('[pipeWs] client', cid, 'closing'); } //if (state.debug) { console.log('[pipeWs] client', cid, 'closing'); }
sendWs(null, hadErr ? 'error': 'end'); sendWs(null, hadErr ? 'error': 'end');
delete remote.clients[cid]; delete srv.clients[cid];
}); });
}; };

File diff suppressed because it is too large Load Diff

View File

@ -19,6 +19,11 @@ module.exports.createTcpConnectionHandler = function (state) {
//return; //return;
conn.once('data', function (firstChunk) { conn.once('data', function (firstChunk) {
var service = 'tcp';
var servername;
var str;
var m;
conn.pause(); conn.pause();
conn.unshift(firstChunk); conn.unshift(firstChunk);
@ -31,18 +36,13 @@ module.exports.createTcpConnectionHandler = function (state) {
// defer after return (instead of being in many places) // defer after return (instead of being in many places)
function deferData(fn) { function deferData(fn) {
if (fn) { if (fn) {
state[fn](servername, conn) state[fn](servername, conn);
} }
process.nextTick(function () { process.nextTick(function () {
conn.resume(); conn.resume();
}); });
} }
var service = 'tcp';
var servername;
var str;
var m;
function tryTls() { function tryTls() {
var vhost; var vhost;
@ -76,9 +76,9 @@ module.exports.createTcpConnectionHandler = function (state) {
return; return;
} }
if (state.debug) { console.log("pipeWs(servername, service, socket, deviceLists['" + servername + "'])"); } if (state.debug) { console.log("pipeWs(servername, service, deviceLists['" + servername + "'], socket)"); }
deferData(); deferData();
pipeWs(servername, service, conn, nextDevice, serviceport); pipeWs(servername, service, nextDevice, conn, serviceport);
} }
// TODO don't run an fs check if we already know this is working elsewhere // TODO don't run an fs check if we already know this is working elsewhere
@ -90,7 +90,7 @@ module.exports.createTcpConnectionHandler = function (state) {
//return; //return;
require('fs').readdir(vhost, function (err, nodes) { require('fs').readdir(vhost, function (err, nodes) {
if (state.debug && err) { console.log("VHOST error", err); } if (state.debug && err) { console.log("VHOST error", err); }
if (err) { run(); return; } if (err || !nodes) { run(); return; }
//if (nodes) { deferData('httpsVhost'); return; } //if (nodes) { deferData('httpsVhost'); return; }
deferData('httpsVhost'); deferData('httpsVhost');
}); });
@ -131,7 +131,7 @@ module.exports.createTcpConnectionHandler = function (state) {
// HTTP // HTTP
if (Devices.exist(state.deviceLists, servername)) { if (Devices.exist(state.deviceLists, servername)) {
deferData(); deferData();
pipeWs(servername, service, conn, Devices.next(state.deviceLists, servername), serviceport); pipeWs(servername, service, Devices.next(state.deviceLists, servername), conn, serviceport);
return; return;
} }
deferData('handleHttp'); deferData('handleHttp');

View File

@ -1,6 +1,6 @@
{ {
"name": "telebit-relay", "name": "telebit-relay",
"version": "0.12.1", "version": "0.13.1",
"description": "Friends don't let friends localhost. Expose your bits with a secure connection even from behind NAT, Firewalls, in a box, with a fox, on a train or in a plane... or a Raspberry Pi in your closet. An attempt to create a better localtunnel.me server, a more open ngrok. Uses Automated HTTPS (Free SSL) via ServerName Indication (SNI). Can also tunnel tls and plain tcp.", "description": "Friends don't let friends localhost. Expose your bits with a secure connection even from behind NAT, Firewalls, in a box, with a fox, on a train or in a plane... or a Raspberry Pi in your closet. An attempt to create a better localtunnel.me server, a more open ngrok. Uses Automated HTTPS (Free SSL) via ServerName Indication (SNI). Can also tunnel tls and plain tcp.",
"main": "lib/relay.js", "main": "lib/relay.js",
"bin": { "bin": {