'use strict'; var sni = require('sni'); var url = require('url'); var PromiseA = require('bluebird'); var jwt = require('jsonwebtoken'); var packer = require('tunnel-packer'); function timeoutPromise(duration) { return new PromiseA(function (resolve) { setTimeout(resolve, duration); }); } var Devices = {}; Devices.add = function (store, servername, newDevice) { var devices = Devices.list(store, servername); devices.push(newDevice); store[servername] = devices; }; Devices.remove = function (store, servername, device) { var devices = Devices.list(store, servername); var index = devices.indexOf(device); if (index < 0) { console.warn('attempted to remove non-present device', device.deviceId, 'from', servername); return null; } return devices.splice(index, 1)[0]; }; Devices.list = function (store, servername) { return store[servername] || []; }; Devices.exist = function (store, servername) { return (store[servername] || []).length; }; Devices.next = function (store, servername) { var devices = Devices.list(store, servername); var device; if (devices._index >= devices.length) { devices._index = 0; } device = devices[devices._index || 0]; devices._index = (devices._index || 0) + 1; return device; }; module.exports.store = { Devices: Devices }; module.exports.create = function (copts) { var deviceLists = {}; var activityTimeout = copts.activityTimeout || 2*60*1000; var pongTimeout = copts.pongTimeout || 10*1000; function onWsConnection(ws) { var socketId = packer.socketToId(ws.upgradeReq.socket); var remotes = {}; function logName() { var result = Object.keys(remotes).map(function (jwtoken) { return remotes[jwtoken].deviceId; }).join(';'); return result || socketId; } function closeBrowserConn(cid) { var remote; Object.keys(remotes).some(function (jwtoken) { if (remotes[jwtoken].clients[cid]) { remote = remotes[jwtoken]; return true; } }); if (!remote) { return; } PromiseA.resolve() .then(function () { remote.clients[cid].end(); return timeoutPromise(500); }) .then(function () { if (remote.clients[cid]) { console.warn(cid, 'browser connection still present after calling `end`'); remote.clients[cid].destroy(); return timeoutPromise(500); } }) .then(function () { if (remote.clients[cid]) { console.error(cid, 'browser connection still present after calling `destroy`'); delete remote.clients[cid]; } }) .catch(function (err) { console.warn('failed to close browser connection', cid, err); }) ; } function addToken(jwtoken) { if (remotes[jwtoken]) { // return { message: "token sent multiple times", code: "E_TOKEN_REPEAT" }; return null; } var token; try { token = jwt.verify(jwtoken, copts.secret); } catch (e) { token = null; } if (!token) { return { message: "invalid access token", code: "E_INVALID_TOKEN" }; } if (!Array.isArray(token.domains)) { if ('string' === typeof token.name) { token.domains = [ token.name ]; } } if (!Array.isArray(token.domains)) { return { message: "invalid server name", code: "E_INVALID_NAME" }; } if (token.domains.some(function (name) { return typeof name !== 'string'; })) { return { message: "invalid server name", code: "E_INVALID_NAME" }; } // Add the custom properties we need to manage this remote, then add it to all the relevant // domains and the list of all this websocket's remotes. token.deviceId = (token.device && (token.device.id || token.device.hostname)) || token.domains.join(','); token.ws = ws; token.clients = {}; token.domains.forEach(function (domainname) { console.log('domainname', domainname); Devices.add(deviceLists, domainname, token); }); remotes[jwtoken] = token; console.log("added token '" + token.deviceId + "' to websocket", socketId); return null; } function removeToken(jwtoken) { var remote = remotes[jwtoken]; if (!remote) { return { message: 'specified token not present', code: 'E_INVALID_TOKEN'}; } // Prevent any more browser connections being sent to this remote, and any existing // connections from trying to send more data across the connection. remote.domains.forEach(function (domainname) { Devices.remove(deviceLists, domainname, remote); }); remote.ws = null; // Close all of the existing browser connections associated with this websocket connection. Object.keys(remote.clients).forEach(function (cid) { closeBrowserConn(cid); }); delete remotes[jwtoken]; console.log("removed token '" + remote.deviceId + "' from websocket", socketId); return null; } var firstToken; var authn = (ws.upgradeReq.headers.authorization||'').split(/\s+/); if (authn[0] && 'basic' === authn[0].toLowerCase()) { try { authn = new Buffer(authn[1], 'base64').toString('ascii').split(':'); firstToken = authn[1]; } catch (err) { } } if (!firstToken) { firstToken = url.parse(ws.upgradeReq.url, true).query.access_token; } if (firstToken) { var err = addToken(firstToken); if (err) { ws.send(packer.pack(null, [0, err], 'control')); ws.close(); return; } } var commandHandlers = { add_token: addToken , delete_token: function (token) { if (token !== '*') { return removeToken(token); } var err; Object.keys(remotes).some(function (jwtoken) { err = removeToken(jwtoken); return err; }); return err; } }; var packerHandlers = { oncontrol: function (opts) { var cmd, err; try { cmd = JSON.parse(opts.data.toString()); } catch (err) {} if (!Array.isArray(cmd) || typeof cmd[0] !== 'number') { var msg = 'received bad command "' + opts.data.toString() + '"'; console.warn(msg, 'from websocket', socketId); ws.send(packer.pack(null, [0, {message: msg, code: 'E_BAD_COMMAND'}], 'control')); return; } if (cmd[0] < 0) { // We only ever send one command and we send it once, so we just hard coded the ID as 1. if (cmd[0] === -1) { if (cmd[1]) { console.log('received error response to hello from', socketId, cmd[1]); } } else { console.warn('received response to unknown command', cmd, 'from', socketId); } return; } if (cmd[0] === 0) { console.warn('received dis-associated error from', socketId, cmd[1]); return; } if (commandHandlers[cmd[1]]) { err = commandHandlers[cmd[1]].apply(null, cmd.slice(2)); } else { err = { message: 'unknown command "'+cmd[1]+'"', code: 'E_UNKNOWN_COMMAND' }; } ws.send(packer.pack(null, [-cmd[0], err], 'control')); } , onmessage: function (opts) { var cid = packer.addrToId(opts); console.log("remote '" + logName() + "' has data for '" + cid + "'", opts.data.byteLength); var browserConn; Object.keys(remotes).some(function (jwtoken) { if (remotes[jwtoken].clients[cid]) { browserConn = remotes[jwtoken].clients[cid]; return true; } }); if (browserConn) { browserConn.write(opts.data); } else { ws.send(packer.pack(opts, null, 'error')); } } , onend: function (opts) { var cid = packer.addrToId(opts); console.log('[TunnelEnd]', cid); closeBrowserConn(cid); } , onerror: function (opts) { var cid = packer.addrToId(opts); console.log('[TunnelError]', cid); closeBrowserConn(cid); } }; var unpacker = packer.create(packerHandlers); var lastActivity = Date.now(); var timeoutId; function refreshTimeout() { lastActivity = Date.now(); } function checkTimeout() { // Determine how long the connection has been "silent", ie no activity. var silent = Date.now() - lastActivity; // If we have had activity within the last activityTimeout then all we need to do is // call this function again at the soonest time when the connection could be timed out. if (silent < activityTimeout) { timeoutId = setTimeout(checkTimeout, activityTimeout-silent); } // Otherwise we check to see if the pong has also timed out, and if not we send a ping // and call this function again when the pong will have timed out. else if (silent < activityTimeout + pongTimeout) { console.log('pinging', logName()); try { ws.ping(); } catch (err) { console.warn('failed to ping home cloud', logName()); } timeoutId = setTimeout(checkTimeout, pongTimeout); } // Last case means the ping we sent before didn't get a response soon enough, so we // need to close the websocket connection. else { console.log('home cloud', logName(), 'connection timed out'); ws.close(1013, 'connection timeout'); } } timeoutId = setTimeout(checkTimeout, activityTimeout); // Note that our websocket library automatically handles pong responses on ping requests // before it even emits the event. ws.on('ping', refreshTimeout); ws.on('pong', refreshTimeout); ws.on('message', function forwardMessage(chunk) { refreshTimeout(); console.log('message from home cloud to tunneler to browser', chunk.byteLength); //console.log(chunk.toString()); unpacker.fns.addChunk(chunk); }); function hangup() { clearTimeout(timeoutId); console.log('home cloud', logName(), 'connection closing'); Object.keys(remotes).forEach(function (jwtoken) { removeToken(jwtoken); }); } ws.on('close', hangup); ws.on('error', hangup); // We only ever send one command and we send it once, so we just hard code the ID as 1 ws.send(packer.pack(null, [1, 'hello', [unpacker._version], Object.keys(commandHandlers)], 'control')); } function pipeWs(servername, service, browserConn, remote) { console.log('[pipeWs] servername:', servername, 'service:', service); var browserAddr = packer.socketToAddr(browserConn); browserAddr.service = service; var cid = packer.addrToId(browserAddr); console.log('[pipeWs] browser is', cid, 'home-cloud is', packer.socketToId(remote.ws.upgradeReq.socket)); function sendWs(data, serviceOverride) { if (remote.ws) { try { remote.ws.send(packer.pack(browserAddr, data, serviceOverride), { binary: true }); } catch (err) { console.warn('[pipeWs] error sending websocket message', err); } } } remote.clients[cid] = browserConn; browserConn.on('data', function (chunk) { console.log('[pipeWs] data from browser to tunneler', chunk.byteLength); sendWs(chunk); }); browserConn.on('error', function (err) { console.warn('[pipeWs] browser connection error', err); }); browserConn.on('close', function (hadErr) { console.log('[pipeWs] browser connection closing'); sendWs(null, hadErr ? 'error': 'end'); delete remote.clients[cid]; }); } function onTcpConnection(browser) { // this works when I put it here, but I don't know if it's tls yet here // httpsServer.emit('connection', socket); //tls3000.emit('connection', socket); //var tlsSocket = new tls.TLSSocket(socket, { secureContext: tls.createSecureContext(tlsOpts) }); //tlsSocket.on('data', function (chunk) { // console.log('dummy', chunk.byteLength); //}); //return; browser.once('data', function (firstChunk) { // BUG XXX: this assumes that the packet won't be chunked smaller // than the 'hello' or the point of the 'Host' header. // This is fairly reasonable, but there are edge cases where // it does not hold (such as manual debugging with telnet) // and so it should be fixed at some point in the future // defer after return (instead of being in many places) process.nextTick(function () { browser.unshift(firstChunk); }); var service = 'tcp'; var servername; var str; var m; function tryTls() { if (-1 !== copts.servernames.indexOf(servername)) { console.log("Lock and load, admin interface time!"); copts.httpsTunnel(servername, browser); return; } if (!servername) { console.log("No SNI was given, so there's nothing we can do here"); copts.httpsInvalid(servername, browser); return; } var nextDevice = Devices.next(deviceLists, servername); if (!nextDevice) { console.log("No devices match the given servername"); copts.httpsInvalid(servername, browser); return; } console.log("pipeWs(servername, service, socket, deviceLists['" + servername + "'])"); pipeWs(servername, service, browser, nextDevice); } // https://github.com/mscdex/httpolyglot/issues/3#issuecomment-173680155 if (22 === firstChunk[0]) { // TLS service = 'https'; servername = (sni(firstChunk)||'').toLowerCase(); console.log("tls hello servername:", servername); tryTls(); return; } if (firstChunk[0] > 32 && firstChunk[0] < 127) { str = firstChunk.toString(); m = str.match(/(?:^|[\r\n])Host: ([^\r\n]+)[\r\n]*/im); servername = (m && m[1].toLowerCase() || '').split(':')[0]; console.log('servername', servername); if (/HTTP\//i.test(str)) { service = 'http'; // TODO disallow http entirely // /^\/\.well-known\/acme-challenge\//.test(str) if (/well-known/.test(str)) { // HTTP if (Devices.exist(deviceLists, servername)) { pipeWs(servername, service, browser, Devices.next(deviceLists, servername)); return; } copts.handleHttp(servername, browser); } else { // redirect to https copts.handleInsecureHttp(servername, browser); } return; } } console.error("Got unexpected connection", str); browser.write(JSON.stringify({ error: { message: "not sure what you were trying to do there..." , code: 'E_INVALID_PROTOCOL' } })); browser.end(); }); browser.on('error', function (err) { console.error('[error] tcp socket raw TODO forward and close'); console.error(err); }); } return { tcp: onTcpConnection, ws: onWsConnection }; };