2016-09-30 01:10:40 +00:00
|
|
|
(function () {
|
|
|
|
'use strict';
|
|
|
|
|
|
|
|
var WebSocket = require('ws');
|
2017-04-28 01:29:16 +00:00
|
|
|
var PromiseA = require('bluebird');
|
2016-09-30 01:10:40 +00:00
|
|
|
var sni = require('sni');
|
2016-10-06 05:55:48 +00:00
|
|
|
var Packer = require('tunnel-packer');
|
2016-09-30 01:10:40 +00:00
|
|
|
|
2017-06-05 17:28:53 +00:00
|
|
|
function timeoutPromise(duration) {
|
|
|
|
return new PromiseA(function (resolve) {
|
|
|
|
setTimeout(resolve, duration);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2016-09-30 19:04:27 +00:00
|
|
|
function run(copts) {
|
2017-06-15 20:49:50 +00:00
|
|
|
// jshint latedef:false
|
2017-09-11 20:52:49 +00:00
|
|
|
var activityTimeout = copts.activityTimeout || (2*60 - 5)*1000;
|
2017-04-10 17:39:27 +00:00
|
|
|
var pongTimeout = copts.pongTimeout || 10*1000;
|
2017-05-25 19:46:09 +00:00
|
|
|
// Allow the tunnel client to be created with no token. This will prevent the connection from
|
|
|
|
// being established initialy and allows the caller to use `.append` for the first token so
|
|
|
|
// they can get a promise that will provide feedback about invalid tokens.
|
|
|
|
var tokens = [];
|
|
|
|
if (copts.token) {
|
|
|
|
tokens.push(copts.token);
|
|
|
|
}
|
2017-04-10 17:39:27 +00:00
|
|
|
|
2016-09-30 19:04:27 +00:00
|
|
|
var wstunneler;
|
2017-04-08 00:49:52 +00:00
|
|
|
var authenticated = false;
|
2017-04-07 23:38:55 +00:00
|
|
|
|
2016-09-30 19:04:27 +00:00
|
|
|
var localclients = {};
|
2017-09-08 16:54:47 +00:00
|
|
|
var pausedClients = [];
|
2017-04-07 23:38:55 +00:00
|
|
|
var clientHandlers = {
|
2017-09-08 16:54:47 +00:00
|
|
|
add: function (conn, cid, opts, servername) {
|
|
|
|
localclients[cid] = conn;
|
|
|
|
console.info("[connect] new client '" + cid + "' for '" + servername + "' (" + clientHandlers.count() + " clients)");
|
|
|
|
|
2017-09-11 20:52:49 +00:00
|
|
|
conn.tunnelCid = cid;
|
|
|
|
conn.tunnelRead = opts.data.byteLength;
|
|
|
|
conn.tunnelWritten = 0;
|
|
|
|
|
2017-09-08 16:54:47 +00:00
|
|
|
conn.on('data', function onLocalData(chunk) {
|
|
|
|
if (conn.tunnelClosing) {
|
|
|
|
console.warn("[onLocalData] received data for '"+cid+"' over socket after connection was ended");
|
|
|
|
return;
|
|
|
|
}
|
2017-09-11 20:52:49 +00:00
|
|
|
// This value is bytes written to the tunnel (ie read from the local connection)
|
|
|
|
conn.tunnelWritten += chunk.byteLength;
|
2017-09-08 16:54:47 +00:00
|
|
|
|
|
|
|
// If we have a lot of buffered data waiting to be sent over the websocket we want to slow
|
|
|
|
// down the data we are getting to send over. We also want to pause all active connections
|
|
|
|
// if any connections are paused to make things more fair so one connection doesn't get
|
|
|
|
// stuff waiting for all other connections to finish because it tried writing near the border.
|
|
|
|
var bufSize = wsHandlers.sendMessage(Packer.pack(opts, chunk));
|
|
|
|
if (pausedClients.length || bufSize > 1024*1024) {
|
2017-09-11 21:35:03 +00:00
|
|
|
// console.log('[onLocalData] paused connection', cid, 'to allow websocket to catch up');
|
2017-09-08 16:54:47 +00:00
|
|
|
conn.pause();
|
|
|
|
pausedClients.push(conn);
|
|
|
|
}
|
|
|
|
});
|
2017-09-11 20:52:49 +00:00
|
|
|
|
|
|
|
var sentEnd = false;
|
|
|
|
conn.on('end', function onLocalEnd() {
|
|
|
|
console.info("[onLocalEnd] connection '" + cid + "' ended, will probably close soon");
|
|
|
|
conn.tunnelClosing = true;
|
|
|
|
if (!sentEnd) {
|
|
|
|
wsHandlers.sendMessage(Packer.pack(opts, null, 'end'));
|
|
|
|
sentEnd = true;
|
|
|
|
}
|
|
|
|
});
|
2017-09-08 16:54:47 +00:00
|
|
|
conn.on('error', function onLocalError(err) {
|
|
|
|
console.info("[onLocalError] connection '" + cid + "' errored:", err);
|
2017-09-11 20:52:49 +00:00
|
|
|
if (!sentEnd) {
|
|
|
|
wsHandlers.sendMessage(Packer.pack(opts, {message: err.message, code: err.code}, 'error'));
|
|
|
|
sentEnd = true;
|
|
|
|
}
|
2017-09-08 16:54:47 +00:00
|
|
|
});
|
|
|
|
conn.on('close', function onLocalClose(hadErr) {
|
|
|
|
delete localclients[cid];
|
2017-09-11 20:52:49 +00:00
|
|
|
console.log('[onLocalClose] closed "' + cid + '" read:'+conn.tunnelRead+', wrote:'+conn.tunnelWritten+' (' + clientHandlers.count() + ' clients)');
|
|
|
|
if (!sentEnd) {
|
|
|
|
wsHandlers.sendMessage(Packer.pack(opts, null, hadErr && 'error' || 'end'));
|
|
|
|
sentEnd = true;
|
|
|
|
}
|
2017-09-08 16:54:47 +00:00
|
|
|
});
|
2017-04-07 23:38:55 +00:00
|
|
|
}
|
2017-09-08 16:54:47 +00:00
|
|
|
|
|
|
|
, write: function (cid, opts) {
|
|
|
|
var conn = localclients[cid];
|
|
|
|
if (!conn) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
//console.log("[=>] received data from '" + cid + "' =>", opts.data.byteLength);
|
|
|
|
|
|
|
|
if (conn.tunnelClosing) {
|
|
|
|
console.warn("[onmessage] received data for '"+cid+"' over socket after connection was ended");
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
conn.write(opts.data);
|
2017-09-11 20:52:49 +00:00
|
|
|
// It might seem weird to increase the "read" value in a function named `write`, but this
|
|
|
|
// is bytes read from the tunnel and written to the local connection.
|
|
|
|
conn.tunnelRead += opts.data.byteLength;
|
2017-09-11 21:35:03 +00:00
|
|
|
|
|
|
|
if (!conn.remotePaused && conn.bufferSize > 1024*1024) {
|
|
|
|
wsHandlers.sendMessage(Packer.pack(opts, conn.tunnelRead, 'pause'));
|
|
|
|
conn.remotePaused = true;
|
|
|
|
|
|
|
|
conn.once('drain', function () {
|
|
|
|
wsHandlers.sendMessage(Packer.pack(opts, conn.tunnelRead, 'resume'));
|
|
|
|
conn.remotePaused = false;
|
|
|
|
});
|
|
|
|
}
|
2017-09-08 16:54:47 +00:00
|
|
|
return true;
|
2017-04-07 23:38:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
, closeSingle: function (cid) {
|
|
|
|
if (!localclients[cid]) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-04-08 00:01:47 +00:00
|
|
|
console.log('[closeSingle]', cid);
|
2017-09-08 16:54:47 +00:00
|
|
|
PromiseA.resolve().then(function () {
|
|
|
|
var conn = localclients[cid];
|
|
|
|
conn.tunnelClosing = true;
|
|
|
|
conn.end();
|
|
|
|
|
|
|
|
// If no data is buffered for writing then we don't need to wait for it to drain.
|
|
|
|
if (!conn.bufferSize) {
|
2017-06-05 17:28:53 +00:00
|
|
|
return timeoutPromise(500);
|
2017-09-08 16:54:47 +00:00
|
|
|
}
|
|
|
|
// Otherwise we want the connection to be able to finish, but we also want to impose
|
|
|
|
// a time limit for it to drain, since it shouldn't have more than 1MB buffered.
|
|
|
|
return new PromiseA(function (resolve) {
|
|
|
|
var timeoutId = setTimeout(resolve, 60*1000);
|
|
|
|
conn.once('drain', function () {
|
|
|
|
clearTimeout(timeoutId);
|
|
|
|
setTimeout(resolve, 500);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
}).then(function () {
|
|
|
|
if (localclients[cid]) {
|
|
|
|
console.warn('[closeSingle]', cid, 'connection still present after calling `end`');
|
|
|
|
localclients[cid].destroy();
|
|
|
|
return timeoutPromise(500);
|
|
|
|
}
|
|
|
|
}).then(function () {
|
|
|
|
if (localclients[cid]) {
|
|
|
|
console.error('[closeSingle]', cid, 'connection still present after calling `destroy`');
|
2017-06-05 17:28:53 +00:00
|
|
|
delete localclients[cid];
|
2017-09-08 16:54:47 +00:00
|
|
|
}
|
|
|
|
}).catch(function (err) {
|
|
|
|
console.error('[closeSingle] failed to close connection', cid, err.toString());
|
|
|
|
delete localclients[cid];
|
|
|
|
});
|
2017-04-07 23:38:55 +00:00
|
|
|
}
|
|
|
|
, closeAll: function () {
|
2017-04-08 00:01:47 +00:00
|
|
|
console.log('[closeAll]');
|
2017-04-07 23:38:55 +00:00
|
|
|
Object.keys(localclients).forEach(function (cid) {
|
2017-06-05 17:28:53 +00:00
|
|
|
clientHandlers.closeSingle(cid);
|
2017-04-07 23:38:55 +00:00
|
|
|
});
|
|
|
|
}
|
2017-04-08 00:01:47 +00:00
|
|
|
|
2017-04-07 23:38:55 +00:00
|
|
|
, count: function () {
|
|
|
|
return Object.keys(localclients).length;
|
|
|
|
}
|
|
|
|
};
|
2017-04-08 00:01:47 +00:00
|
|
|
|
2017-04-28 01:29:16 +00:00
|
|
|
var pendingCommands = {};
|
|
|
|
function sendCommand(name) {
|
|
|
|
var id = Math.ceil(1e9 * Math.random());
|
|
|
|
var cmd = [id, name].concat(Array.prototype.slice.call(arguments, 1));
|
|
|
|
|
|
|
|
wsHandlers.sendMessage(Packer.pack(null, cmd, 'control'));
|
|
|
|
setTimeout(function () {
|
|
|
|
if (pendingCommands[id]) {
|
|
|
|
console.warn('command', id, 'timed out');
|
|
|
|
pendingCommands[id]({
|
|
|
|
message: 'response not received in time'
|
|
|
|
, code: 'E_TIMEOUT'
|
|
|
|
});
|
|
|
|
}
|
|
|
|
}, pongTimeout);
|
|
|
|
|
|
|
|
return new PromiseA(function (resolve, reject) {
|
|
|
|
pendingCommands[id] = function (err, result) {
|
|
|
|
delete pendingCommands[id];
|
|
|
|
if (err) {
|
|
|
|
reject(err);
|
|
|
|
} else {
|
|
|
|
resolve(result);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2017-04-28 21:02:44 +00:00
|
|
|
function sendAllTokens() {
|
|
|
|
tokens.forEach(function (jwtoken) {
|
|
|
|
sendCommand('add_token', jwtoken)
|
|
|
|
.catch(function (err) {
|
|
|
|
console.error('failed re-adding token', jwtoken, 'after reconnect', err);
|
|
|
|
// Not sure if we should do something like remove the token here. It worked
|
|
|
|
// once or it shouldn't have stayed in the list, so it's less certain why
|
|
|
|
// it would have failed here.
|
|
|
|
});
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2017-04-28 21:28:21 +00:00
|
|
|
var connCallback;
|
|
|
|
|
2017-04-07 23:38:55 +00:00
|
|
|
var packerHandlers = {
|
2017-04-28 01:29:16 +00:00
|
|
|
oncontrol: function (opts) {
|
|
|
|
var cmd, err;
|
|
|
|
try {
|
|
|
|
cmd = JSON.parse(opts.data.toString());
|
|
|
|
} catch (err) {}
|
|
|
|
if (!Array.isArray(cmd) || typeof cmd[0] !== 'number') {
|
|
|
|
console.warn('received bad command "' + opts.data.toString() + '"');
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (cmd[0] < 0) {
|
|
|
|
var cb = pendingCommands[-cmd[0]];
|
|
|
|
if (!cb) {
|
|
|
|
console.warn('received response for unknown request:', cmd);
|
|
|
|
} else {
|
|
|
|
cb.apply(null, cmd.slice(1));
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-04-28 21:02:44 +00:00
|
|
|
if (cmd[0] === 0) {
|
|
|
|
console.warn('received dis-associated error from server', cmd[1]);
|
2017-04-28 21:28:21 +00:00
|
|
|
if (connCallback) {
|
|
|
|
connCallback(cmd[1]);
|
|
|
|
}
|
2017-04-28 21:02:44 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (cmd[1] === 'hello') {
|
|
|
|
// We only get the 'hello' event after the token has been validated
|
|
|
|
authenticated = true;
|
|
|
|
sendAllTokens();
|
2017-04-28 21:28:21 +00:00
|
|
|
if (connCallback) {
|
|
|
|
connCallback();
|
|
|
|
}
|
2017-04-28 21:02:44 +00:00
|
|
|
// TODO: handle the versions and commands provided by 'hello' - isn't super important
|
2017-05-25 19:46:09 +00:00
|
|
|
// yet since there is only one version and set of commands.
|
2017-04-28 21:02:44 +00:00
|
|
|
err = null;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
err = { message: 'unknown command "'+cmd[1]+'"', code: 'E_UNKNOWN_COMMAND' };
|
|
|
|
}
|
2017-04-28 01:29:16 +00:00
|
|
|
|
|
|
|
wsHandlers.sendMessage(Packer.pack(null, [-cmd[0], err], 'control'));
|
|
|
|
}
|
2017-09-08 16:54:47 +00:00
|
|
|
|
2017-04-28 01:29:16 +00:00
|
|
|
, onmessage: function (opts) {
|
2016-10-06 05:02:28 +00:00
|
|
|
var net = copts.net || require('net');
|
2016-10-06 05:55:48 +00:00
|
|
|
var cid = Packer.addrToId(opts);
|
2017-04-03 21:11:59 +00:00
|
|
|
var service = opts.service.toLowerCase();
|
|
|
|
var portList = copts.services[service];
|
2016-09-30 19:04:27 +00:00
|
|
|
var servername;
|
2017-04-03 21:11:59 +00:00
|
|
|
var port;
|
2016-09-30 19:04:27 +00:00
|
|
|
var str;
|
|
|
|
var m;
|
|
|
|
|
2017-09-08 16:54:47 +00:00
|
|
|
if (clientHandlers.write(cid, opts)) {
|
2016-09-30 19:04:27 +00:00
|
|
|
return;
|
|
|
|
}
|
2017-04-03 21:11:59 +00:00
|
|
|
if (!portList) {
|
2017-04-07 23:38:55 +00:00
|
|
|
packerHandlers._onConnectError(cid, opts, new Error("unsupported service '" + service + "'"));
|
2017-04-03 21:11:59 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ('http' === service) {
|
2016-09-30 19:04:27 +00:00
|
|
|
str = opts.data.toString();
|
|
|
|
m = str.match(/(?:^|[\r\n])Host: ([^\r\n]+)[\r\n]*/im);
|
|
|
|
servername = (m && m[1].toLowerCase() || '').split(':')[0];
|
|
|
|
}
|
|
|
|
else if ('https' === service) {
|
|
|
|
servername = sni(opts.data);
|
|
|
|
}
|
|
|
|
else {
|
2017-04-03 21:11:59 +00:00
|
|
|
servername = '*';
|
2016-09-30 19:04:27 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!servername) {
|
|
|
|
//console.warn(opts.data.toString());
|
2017-04-07 23:38:55 +00:00
|
|
|
packerHandlers._onConnectError(cid, opts, new Error("missing servername for '" + cid + "' " + opts.data.byteLength));
|
2016-09-30 19:04:27 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-06-05 17:20:58 +00:00
|
|
|
port = portList[servername];
|
|
|
|
if (!port) {
|
|
|
|
// Check for any wildcard domains, sorted longest to shortest so the one with the
|
|
|
|
// biggest natural match will be found first.
|
|
|
|
Object.keys(portList).filter(function (pattern) {
|
|
|
|
return pattern[0] === '*' && pattern.length > 1;
|
|
|
|
}).sort(function (a, b) {
|
|
|
|
return b.length - a.length;
|
|
|
|
}).some(function (pattern) {
|
|
|
|
var subPiece = pattern.slice(1);
|
|
|
|
if (subPiece === servername.slice(-subPiece.length)) {
|
|
|
|
port = portList[pattern];
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
});
|
|
|
|
}
|
|
|
|
if (!port) {
|
|
|
|
port = portList['*'];
|
|
|
|
}
|
|
|
|
|
2017-04-28 00:38:01 +00:00
|
|
|
var createOpts = {
|
2016-10-11 23:43:24 +00:00
|
|
|
port: port
|
2016-10-06 05:02:28 +00:00
|
|
|
, host: '127.0.0.1'
|
2016-10-11 23:43:24 +00:00
|
|
|
|
|
|
|
, servername: servername
|
2016-10-06 05:10:16 +00:00
|
|
|
, data: opts.data
|
2016-10-06 21:01:58 +00:00
|
|
|
, remoteFamily: opts.family
|
|
|
|
, remoteAddress: opts.address
|
|
|
|
, remotePort: opts.port
|
2017-04-28 00:38:01 +00:00
|
|
|
};
|
2017-09-08 16:54:47 +00:00
|
|
|
var conn = net.createConnection(createOpts, function () {
|
2017-04-28 00:38:01 +00:00
|
|
|
// this will happen before 'data' or 'readable' is triggered
|
|
|
|
// We use the data from the createOpts object so that the createConnection function has
|
|
|
|
// the oppurtunity of removing/changing it if it wants/needs to handle it differently.
|
|
|
|
if (createOpts.data) {
|
2017-09-08 16:54:47 +00:00
|
|
|
conn.write(createOpts.data);
|
2017-04-28 00:38:01 +00:00
|
|
|
}
|
2016-09-30 19:04:27 +00:00
|
|
|
});
|
2016-10-06 05:02:28 +00:00
|
|
|
|
2017-09-08 16:54:47 +00:00
|
|
|
clientHandlers.add(conn, cid, opts, servername);
|
|
|
|
}
|
2016-10-11 23:43:24 +00:00
|
|
|
|
2017-09-08 16:54:47 +00:00
|
|
|
, onpause: function (opts) {
|
|
|
|
var cid = Packer.addrToId(opts);
|
|
|
|
if (localclients[cid]) {
|
2017-09-11 20:52:49 +00:00
|
|
|
console.log("[TunnelPause] pausing '"+cid+"', remote received", opts.data.toString(), 'of', localclients[cid].tunnelWritten, 'sent');
|
2017-09-08 16:54:47 +00:00
|
|
|
localclients[cid].manualPause = true;
|
|
|
|
localclients[cid].pause();
|
|
|
|
} else {
|
2017-09-11 20:52:49 +00:00
|
|
|
console.log('[TunnelPause] remote tried pausing finished connection', cid);
|
|
|
|
// Often we have enough latency that we've finished sending before we're told to pause, so
|
|
|
|
// don't worry about sending back errors, since we won't be sending data over anyway.
|
|
|
|
// wsHandlers.sendMessage(Packer.pack(opts, {message: 'no matching connection', code: 'E_NO_CONN'}, 'error'));
|
2017-09-08 16:54:47 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
, onresume: function (opts) {
|
|
|
|
var cid = Packer.addrToId(opts);
|
|
|
|
if (localclients[cid]) {
|
2017-09-11 20:52:49 +00:00
|
|
|
console.log("[TunnelResume] resuming '"+cid+"', remote received", opts.data.toString(), 'of', localclients[cid].tunnelWritten, 'sent');
|
2017-09-08 16:54:47 +00:00
|
|
|
localclients[cid].manualPause = false;
|
|
|
|
localclients[cid].resume();
|
|
|
|
} else {
|
2017-09-11 20:52:49 +00:00
|
|
|
console.log('[TunnelResume] remote tried resuming finished connection', cid);
|
|
|
|
// wsHandlers.sendMessage(Packer.pack(opts, {message: 'no matching connection', code: 'E_NO_CONN'}, 'error'));
|
2017-09-08 16:54:47 +00:00
|
|
|
}
|
2016-09-30 19:04:27 +00:00
|
|
|
}
|
2017-09-08 16:54:47 +00:00
|
|
|
|
2016-09-30 19:04:27 +00:00
|
|
|
, onend: function (opts) {
|
2016-10-06 05:55:48 +00:00
|
|
|
var cid = Packer.addrToId(opts);
|
2016-09-30 19:04:27 +00:00
|
|
|
//console.log("[end] '" + cid + "'");
|
2017-04-07 23:38:55 +00:00
|
|
|
clientHandlers.closeSingle(cid);
|
2016-09-30 19:04:27 +00:00
|
|
|
}
|
|
|
|
, onerror: function (opts) {
|
2016-10-06 05:55:48 +00:00
|
|
|
var cid = Packer.addrToId(opts);
|
2016-09-30 19:04:27 +00:00
|
|
|
//console.log("[error] '" + cid + "'", opts.code || '', opts.message);
|
2017-04-07 23:38:55 +00:00
|
|
|
clientHandlers.closeSingle(cid);
|
2016-09-30 19:04:27 +00:00
|
|
|
}
|
2017-09-08 16:54:47 +00:00
|
|
|
|
2017-04-07 23:38:55 +00:00
|
|
|
, _onConnectError: function (cid, opts, err) {
|
|
|
|
console.info("[_onConnectError] opening '" + cid + "' failed because " + err.message);
|
2017-04-08 00:49:52 +00:00
|
|
|
wsHandlers.sendMessage(Packer.pack(opts, null, 'error'));
|
2016-09-30 19:04:27 +00:00
|
|
|
}
|
|
|
|
};
|
2017-04-08 00:01:47 +00:00
|
|
|
|
2017-04-10 17:39:27 +00:00
|
|
|
var lastActivity;
|
|
|
|
var timeoutId;
|
2016-09-30 19:04:27 +00:00
|
|
|
var wsHandlers = {
|
2017-04-10 17:39:27 +00:00
|
|
|
refreshTimeout: function () {
|
|
|
|
lastActivity = Date.now();
|
|
|
|
}
|
|
|
|
, checkTimeout: function () {
|
|
|
|
if (!wstunneler) {
|
|
|
|
console.warn('checkTimeout called when websocket already closed');
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
// Determine how long the connection has been "silent", ie no activity.
|
|
|
|
var silent = Date.now() - lastActivity;
|
|
|
|
|
|
|
|
// If we have had activity within the last activityTimeout then all we need to do is
|
|
|
|
// call this function again at the soonest time when the connection could be timed out.
|
|
|
|
if (silent < activityTimeout) {
|
|
|
|
timeoutId = setTimeout(wsHandlers.checkTimeout, activityTimeout-silent);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Otherwise we check to see if the pong has also timed out, and if not we send a ping
|
|
|
|
// and call this function again when the pong will have timed out.
|
|
|
|
else if (silent < activityTimeout + pongTimeout) {
|
|
|
|
console.log('pinging tunnel server');
|
|
|
|
try {
|
|
|
|
wstunneler.ping();
|
|
|
|
} catch (err) {
|
|
|
|
console.warn('failed to ping tunnel server', err);
|
|
|
|
}
|
|
|
|
timeoutId = setTimeout(wsHandlers.checkTimeout, pongTimeout);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Last case means the ping we sent before didn't get a response soon enough, so we
|
|
|
|
// need to close the websocket connection.
|
|
|
|
else {
|
|
|
|
console.log('connection timed out');
|
|
|
|
wstunneler.close(1000, 'connection timeout');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
, onOpen: function () {
|
2016-09-30 19:04:27 +00:00
|
|
|
console.info("[open] connected to '" + copts.stunneld + "'");
|
2017-04-10 17:39:27 +00:00
|
|
|
wsHandlers.refreshTimeout();
|
|
|
|
timeoutId = setTimeout(wsHandlers.checkTimeout, activityTimeout);
|
2017-09-08 16:54:47 +00:00
|
|
|
|
|
|
|
wstunneler._socket.on('drain', function () {
|
2017-09-11 21:35:03 +00:00
|
|
|
// the websocket library has it's own buffer apart from node's socket buffer, but that one
|
|
|
|
// is much more difficult to watch, so we watch for the lower level buffer to drain and
|
|
|
|
// then check to see if the upper level buffer is still too full to write to. Note that
|
|
|
|
// the websocket library buffer has something to do with compression, so I'm not requiring
|
|
|
|
// that to be 0 before we start up again.
|
|
|
|
if (wstunneler.bufferedAmount > 128*1024) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-09-08 16:54:47 +00:00
|
|
|
pausedClients.forEach(function (conn) {
|
|
|
|
if (!conn.manualPause) {
|
2017-09-11 21:35:03 +00:00
|
|
|
// console.log('resuming connection', conn.tunnelCid, 'now the websocket has caught up');
|
2017-09-08 16:54:47 +00:00
|
|
|
conn.resume();
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
pausedClients.length = 0;
|
|
|
|
});
|
2016-09-30 01:10:40 +00:00
|
|
|
}
|
|
|
|
|
2016-09-30 19:04:27 +00:00
|
|
|
, onClose: function () {
|
2017-04-07 23:38:55 +00:00
|
|
|
console.log('ON CLOSE');
|
2017-04-10 17:39:27 +00:00
|
|
|
clearTimeout(timeoutId);
|
2017-04-08 00:49:52 +00:00
|
|
|
wstunneler = null;
|
2017-04-07 23:38:55 +00:00
|
|
|
clientHandlers.closeAll();
|
2017-10-03 00:29:00 +00:00
|
|
|
|
|
|
|
var error = new Error('websocket connection closed before response');
|
|
|
|
error.code = 'E_CONN_CLOSED';
|
2017-04-28 01:29:16 +00:00
|
|
|
Object.keys(pendingCommands).forEach(function (id) {
|
2017-10-03 00:29:00 +00:00
|
|
|
pendingCommands[id](error);
|
2017-04-28 01:29:16 +00:00
|
|
|
});
|
2017-10-03 00:29:00 +00:00
|
|
|
if (connCallback) {
|
|
|
|
connCallback(error);
|
|
|
|
}
|
2017-04-07 23:38:55 +00:00
|
|
|
|
2016-09-30 19:04:27 +00:00
|
|
|
if (!authenticated) {
|
|
|
|
console.info('[close] failed on first attempt... check authentication.');
|
2017-04-10 17:39:27 +00:00
|
|
|
timeoutId = null;
|
2016-09-30 19:04:27 +00:00
|
|
|
}
|
2017-04-28 16:57:48 +00:00
|
|
|
else if (tokens.length) {
|
2016-09-30 19:04:27 +00:00
|
|
|
console.info('[retry] disconnected and waiting...');
|
2017-04-10 17:39:27 +00:00
|
|
|
timeoutId = setTimeout(connect, 5000);
|
2016-09-30 19:04:27 +00:00
|
|
|
}
|
|
|
|
}
|
2016-09-30 05:46:00 +00:00
|
|
|
|
2016-09-30 19:04:27 +00:00
|
|
|
, onError: function (err) {
|
|
|
|
console.error("[tunnel error] " + err.message);
|
2016-09-30 05:23:03 +00:00
|
|
|
console.error(err);
|
2017-10-03 00:29:00 +00:00
|
|
|
if (connCallback) {
|
|
|
|
connCallback(err);
|
|
|
|
}
|
2016-09-30 19:04:27 +00:00
|
|
|
}
|
2016-09-30 05:46:00 +00:00
|
|
|
|
2017-04-08 00:49:52 +00:00
|
|
|
, sendMessage: function (msg) {
|
|
|
|
if (wstunneler) {
|
|
|
|
try {
|
2017-04-10 17:39:27 +00:00
|
|
|
wstunneler.send(msg, {binary: true});
|
2017-09-11 21:35:03 +00:00
|
|
|
return wstunneler.bufferedAmount;
|
2017-04-08 00:49:52 +00:00
|
|
|
} catch (err) {
|
2017-04-26 23:37:52 +00:00
|
|
|
// There is a chance that this occurred after the websocket was told to close
|
|
|
|
// and before it finished, in which case we don't need to log the error.
|
|
|
|
if (wstunneler.readyState !== wstunneler.CLOSING) {
|
|
|
|
console.warn('[sendMessage] error sending websocket message', err);
|
|
|
|
}
|
2017-04-08 00:49:52 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
function connect() {
|
2017-04-28 16:57:48 +00:00
|
|
|
if (!tokens.length) {
|
2017-04-08 00:49:52 +00:00
|
|
|
return;
|
|
|
|
}
|
2017-04-28 21:28:21 +00:00
|
|
|
if (wstunneler) {
|
|
|
|
console.warn('attempted to connect with connection already active');
|
|
|
|
return;
|
|
|
|
}
|
2017-04-10 17:39:27 +00:00
|
|
|
timeoutId = null;
|
2017-04-08 00:49:52 +00:00
|
|
|
var machine = require('tunnel-packer').create(packerHandlers);
|
|
|
|
|
|
|
|
console.info("[connect] '" + copts.stunneld + "'");
|
2017-04-28 16:57:48 +00:00
|
|
|
var tunnelUrl = copts.stunneld.replace(/\/$/, '') + '/?access_token=' + tokens[0];
|
2017-04-08 00:49:52 +00:00
|
|
|
wstunneler = new WebSocket(tunnelUrl, { rejectUnauthorized: !copts.insecure });
|
|
|
|
wstunneler.on('open', wsHandlers.onOpen);
|
|
|
|
wstunneler.on('close', wsHandlers.onClose);
|
|
|
|
wstunneler.on('error', wsHandlers.onError);
|
2017-04-10 17:39:27 +00:00
|
|
|
|
|
|
|
// Our library will automatically handle sending the pong respose to ping requests.
|
|
|
|
wstunneler.on('ping', wsHandlers.refreshTimeout);
|
|
|
|
wstunneler.on('pong', wsHandlers.refreshTimeout);
|
2017-04-08 00:49:52 +00:00
|
|
|
wstunneler.on('message', function (data, flags) {
|
2017-04-10 17:39:27 +00:00
|
|
|
wsHandlers.refreshTimeout();
|
2017-04-08 00:49:52 +00:00
|
|
|
if (data.error || '{' === data[0]) {
|
|
|
|
console.log(data);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
machine.fns.addChunk(data, flags);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
connect();
|
|
|
|
|
2017-06-15 20:49:50 +00:00
|
|
|
var connPromise;
|
2017-04-14 22:27:25 +00:00
|
|
|
return {
|
|
|
|
end: function() {
|
2017-04-28 16:57:48 +00:00
|
|
|
tokens.length = 0;
|
2017-04-14 22:27:25 +00:00
|
|
|
if (timeoutId) {
|
|
|
|
clearTimeout(timeoutId);
|
|
|
|
timeoutId = null;
|
|
|
|
}
|
2017-04-08 00:49:52 +00:00
|
|
|
|
2017-04-14 22:27:25 +00:00
|
|
|
if (wstunneler) {
|
|
|
|
try {
|
|
|
|
wstunneler.close();
|
|
|
|
} catch(e) {
|
|
|
|
console.error("[error] wstunneler.close()");
|
|
|
|
console.error(e);
|
|
|
|
}
|
2016-09-30 05:46:00 +00:00
|
|
|
}
|
|
|
|
}
|
2017-04-28 01:29:16 +00:00
|
|
|
, append: function (token) {
|
2017-04-28 16:57:48 +00:00
|
|
|
if (tokens.indexOf(token) >= 0) {
|
|
|
|
return PromiseA.resolve();
|
|
|
|
}
|
|
|
|
tokens.push(token);
|
2017-04-28 21:28:21 +00:00
|
|
|
var prom;
|
|
|
|
if (tokens.length === 1 && !wstunneler) {
|
|
|
|
// We just added the only token in the list, and the websocket connection isn't up
|
|
|
|
// so we need to restart the connection.
|
|
|
|
if (timeoutId) {
|
|
|
|
// Handle the case were the last token was removed and this token added between
|
|
|
|
// reconnect attempts to make sure we don't try openning multiple connections.
|
|
|
|
clearTimeout(timeoutId);
|
|
|
|
timeoutId = null;
|
|
|
|
}
|
|
|
|
|
|
|
|
// We want this case to behave as much like the other case as we can, but we don't have
|
|
|
|
// the same kind of reponses when we open brand new connections, so we have to rely on
|
|
|
|
// the 'hello' and the 'un-associated' error commands to determine if the token is good.
|
2017-06-15 20:49:50 +00:00
|
|
|
prom = connPromise = new PromiseA(function (resolve, reject) {
|
2017-04-28 21:28:21 +00:00
|
|
|
connCallback = function (err) {
|
|
|
|
connCallback = null;
|
2017-06-15 20:49:50 +00:00
|
|
|
connPromise = null;
|
2017-04-28 21:28:21 +00:00
|
|
|
if (err) {
|
|
|
|
reject(err);
|
|
|
|
} else {
|
|
|
|
resolve();
|
|
|
|
}
|
|
|
|
};
|
|
|
|
});
|
|
|
|
connect();
|
|
|
|
}
|
2017-06-15 20:49:50 +00:00
|
|
|
else if (connPromise) {
|
|
|
|
prom = connPromise.then(function () {
|
|
|
|
return sendCommand('add_token', token);
|
|
|
|
});
|
|
|
|
}
|
2017-04-28 21:28:21 +00:00
|
|
|
else {
|
|
|
|
prom = sendCommand('add_token', token);
|
|
|
|
}
|
2017-04-28 16:57:48 +00:00
|
|
|
|
|
|
|
prom.catch(function (err) {
|
|
|
|
console.error('adding token', token, 'failed:', err);
|
|
|
|
// Most probably an invalid token of some kind, so we don't really want to keep it.
|
2017-10-03 00:29:00 +00:00
|
|
|
tokens.splice(tokens.indexOf(token), 1);
|
2017-04-28 16:57:48 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
return prom;
|
2017-04-28 01:29:16 +00:00
|
|
|
}
|
|
|
|
, clear: function (token) {
|
2017-04-28 16:57:48 +00:00
|
|
|
if (typeof token === 'undefined') {
|
|
|
|
token = '*';
|
|
|
|
}
|
|
|
|
|
|
|
|
if (token === '*') {
|
|
|
|
tokens.length = 0;
|
|
|
|
} else {
|
|
|
|
var index = tokens.indexOf(token);
|
|
|
|
if (index < 0) {
|
|
|
|
return PromiseA.resolve();
|
|
|
|
}
|
|
|
|
tokens.splice(index);
|
|
|
|
}
|
|
|
|
|
|
|
|
var prom = sendCommand('delete_token', token);
|
|
|
|
prom.catch(function (err) {
|
|
|
|
console.error('clearing token', token, 'failed:', err);
|
|
|
|
});
|
|
|
|
|
|
|
|
return prom;
|
2017-04-28 01:29:16 +00:00
|
|
|
}
|
2017-04-14 22:27:25 +00:00
|
|
|
};
|
2016-09-30 19:04:27 +00:00
|
|
|
}
|
2016-09-30 05:46:00 +00:00
|
|
|
|
2016-09-30 19:04:27 +00:00
|
|
|
module.exports.connect = run;
|
2017-04-14 22:27:25 +00:00
|
|
|
module.exports.createConnection = run;
|
2016-09-30 01:10:40 +00:00
|
|
|
|
|
|
|
}());
|