telebit/cmd/telebit/telebit.go

441 lines
12 KiB
Go
Raw Normal View History

2020-06-03 07:47:06 +00:00
//go:generate go run -mod=vendor git.rootprojects.org/root/go-gitver
package main
import (
"context"
2020-06-03 07:47:06 +00:00
"encoding/base64"
"encoding/hex"
2020-05-05 06:44:21 +00:00
"flag"
2017-04-04 18:09:20 +00:00
"fmt"
2020-05-05 06:44:21 +00:00
"log"
2020-06-03 07:47:06 +00:00
"net"
"net/url"
2020-05-05 06:44:21 +00:00
"os"
2020-06-09 00:58:52 +00:00
"strconv"
2017-04-04 18:09:20 +00:00
"strings"
2020-06-03 07:47:06 +00:00
"time"
2020-06-03 07:47:06 +00:00
"git.coolaj86.com/coolaj86/go-telebitd/mgmt"
"git.coolaj86.com/coolaj86/go-telebitd/mgmt/authstore"
telebit "git.coolaj86.com/coolaj86/go-telebitd/mplexer"
"git.coolaj86.com/coolaj86/go-telebitd/mplexer/dns01"
2020-05-05 06:44:21 +00:00
2020-05-06 17:11:13 +00:00
"github.com/caddyserver/certmagic"
2020-06-03 07:47:06 +00:00
"github.com/denisbrodbeck/machineid"
jwt "github.com/dgrijalva/jwt-go"
2020-06-03 07:47:06 +00:00
"github.com/go-acme/lego/v3/challenge"
2020-05-06 17:11:13 +00:00
"github.com/go-acme/lego/v3/providers/dns/duckdns"
2020-06-03 07:47:06 +00:00
"github.com/go-acme/lego/v3/providers/dns/godaddy"
2020-05-05 06:44:21 +00:00
_ "github.com/joho/godotenv/autoload"
)
2020-06-03 07:47:06 +00:00
var (
// GitRev refers to the abbreviated commit hash
GitRev = "0000000"
// GitVersion refers to the most recent tag, plus any commits made since then
GitVersion = "v0.0.0-pre0+0000000"
// GitTimestamp refers to the timestamp of the most recent commit
GitTimestamp = "0000-00-00T00:00:00+0000"
)
2017-04-04 18:09:20 +00:00
2020-06-03 07:47:06 +00:00
type Forward struct {
scheme string
pattern string
port string
2017-04-04 18:09:20 +00:00
}
2020-06-03 07:47:06 +00:00
func main() {
var domains []string
var forwards []Forward
var portForwards []Forward
2020-06-03 07:47:06 +00:00
// TODO replace the websocket connection with a mock server
appID := flag.String("app-id", "telebit.io", "a unique identifier for a deploy target environment")
email := flag.String("acme-email", "", "email to use for Let's Encrypt / ACME registration")
certpath := flag.String("acme-storage", "./acme.d/", "path to ACME storage directory")
acmeAgree := flag.Bool("acme-agree", false, "agree to the terms of the ACME service provider (required)")
acmeStaging := flag.Bool("acme-staging", false, "get fake certificates for testing")
acmeDirectory := flag.String("acme-directory", "", "ACME Directory URL")
enableHTTP01 := flag.Bool("acme-http-01", false, "enable HTTP-01 ACME challenges")
enableTLSALPN01 := flag.Bool("acme-tls-alpn-01", false, "enable TLS-ALPN-01 ACME challenges")
acmeRelay := flag.String("acme-relay", "", "the base url of the ACME DNS-01 relay, if not the same as the tunnel relay")
authURL := flag.String("auth-url", "", "the base url for authentication, if not the same as the tunnel relay")
relay := flag.String("relay", "", "the domain (or ip address) at which the relay server is running")
secret := flag.String("secret", "", "the same secret used by telebit-relay (used for JWT authentication)")
token := flag.String("token", "", "a pre-generated token to give the server (instead of generating one with --secret)")
2020-06-09 00:58:52 +00:00
bindAddrsStr := flag.String("listen", "", "list of bind addresses on which to listen, such as localhost:80, or :443")
2020-06-03 07:47:06 +00:00
locals := flag.String("locals", "", "a list of <from-domain>:<to-port>")
portToPorts := flag.String("port-forward", "", "a list of <from-port>:<to-port> for raw port-forwarding")
2020-06-03 07:47:06 +00:00
flag.Parse()
2020-06-03 07:47:06 +00:00
if len(os.Args) >= 2 {
if "version" == os.Args[1] {
fmt.Printf("telebit %s %s %s", GitVersion, GitRev[:7], GitTimestamp)
os.Exit(0)
2017-04-04 18:09:20 +00:00
}
}
2020-06-09 00:58:52 +00:00
if len(*acmeDirectory) > 0 {
2020-06-03 07:47:06 +00:00
if *acmeStaging {
fmt.Fprintf(os.Stderr, "pick either acme-directory or acme-staging\n")
os.Exit(1)
2020-06-09 00:58:52 +00:00
return
}
2017-04-04 18:09:20 +00:00
}
2020-06-03 07:47:06 +00:00
if *acmeStaging {
*acmeDirectory = certmagic.LetsEncryptStagingCA
2017-04-04 18:09:20 +00:00
}
2020-06-09 00:58:52 +00:00
if 0 == len(*locals) {
2020-06-03 07:47:06 +00:00
*locals = os.Getenv("LOCALS")
}
for _, cfg := range strings.Fields(strings.ReplaceAll(*locals, ",", " ")) {
parts := strings.Split(cfg, ":")
last := len(parts) - 1
port := parts[last]
domain := parts[last-1]
scheme := ""
if len(parts) > 2 {
scheme = parts[0]
}
2020-06-03 07:47:06 +00:00
forwards = append(forwards, Forward{
scheme: scheme,
pattern: domain,
port: port,
})
// don't load wildcard into jwt domains
if "*" == domain {
continue
}
2020-06-03 07:47:06 +00:00
domains = append(domains, domain)
2017-04-04 18:09:20 +00:00
}
if 0 == len(*portToPorts) {
*portToPorts = os.Getenv("PORT_FORWARDS")
}
portForwards, err := parsePortForwards(portToPorts)
if nil != err {
fmt.Fprintf(os.Stderr, "%s", err)
os.Exit(1)
return
}
2020-06-09 00:58:52 +00:00
bindAddrs, err := parseBindAddrs(*bindAddrsStr)
2020-06-03 07:47:06 +00:00
if nil != err {
2020-06-09 00:58:52 +00:00
fmt.Fprintf(os.Stderr, "invalid bind address(es) given to --listen\n")
2020-06-03 07:47:06 +00:00
os.Exit(1)
2020-06-09 00:58:52 +00:00
return
2017-04-04 18:09:20 +00:00
}
2020-06-09 00:58:52 +00:00
if 0 == len(*secret) {
*secret = os.Getenv("SECRET")
2017-04-04 18:09:20 +00:00
}
2020-06-09 00:58:52 +00:00
ppid, err := machineid.ProtectedID(fmt.Sprintf("%s|%s", *appID, *secret))
2020-06-03 07:47:06 +00:00
if nil != err {
2020-06-09 00:58:52 +00:00
fmt.Fprintf(os.Stderr, "unauthorized device\n")
2020-06-03 07:47:06 +00:00
os.Exit(1)
return
2017-04-04 18:09:20 +00:00
}
2020-06-09 00:58:52 +00:00
ppidBytes, err := hex.DecodeString(ppid)
ppid = base64.RawURLEncoding.EncodeToString(ppidBytes)
2017-04-04 18:09:20 +00:00
2020-06-09 00:58:52 +00:00
if 0 == len(*token) {
*token, err = authstore.HMACToken(ppid)
if nil != err {
fmt.Fprintf(os.Stderr, "neither secret nor token provided\n")
os.Exit(1)
return
}
}
if 0 == len(*relay) {
2020-06-03 07:47:06 +00:00
*relay = os.Getenv("RELAY") // "wss://example.com:443"
2017-04-04 18:09:20 +00:00
}
2020-06-09 00:58:52 +00:00
if 0 == len(*relay) {
fmt.Fprintf(os.Stderr, "Missing relay url\n")
2020-06-03 07:47:06 +00:00
os.Exit(1)
return
2020-05-05 06:44:21 +00:00
}
2020-06-09 00:58:52 +00:00
if 0 == len(*acmeRelay) {
2020-06-03 07:47:06 +00:00
*acmeRelay = strings.Replace(*relay, "ws", "http", 1) // "https://example.com:443"
2017-04-04 18:09:20 +00:00
}
2020-05-05 06:44:21 +00:00
2020-06-09 00:58:52 +00:00
if len(*relay) > 0 || len(*acmeRelay) > 0 {
if "" == *authURL {
*authURL = strings.Replace(*relay, "ws", "http", 1) // "https://example.com:443"
2017-04-04 18:09:20 +00:00
}
2020-06-09 00:58:52 +00:00
// TODO look at relay rather than authURL?
grants, err := telebit.Inspect(*authURL, *token)
if nil != err {
_, err := mgmt.Register(*authURL, *secret, ppid)
if nil != err {
fmt.Fprintf(os.Stderr, "failed to register client: %s\n", err)
os.Exit(1)
}
grants, err = telebit.Inspect(*authURL, *token)
if nil != err {
fmt.Fprintf(os.Stderr, "failed to authenticate after registering client: %s\n", err)
os.Exit(1)
}
2017-04-04 18:09:20 +00:00
}
2020-06-09 00:58:52 +00:00
fmt.Println("grants", grants)
2017-04-04 18:09:20 +00:00
}
2020-06-09 00:58:52 +00:00
provider, err := getACMEProvider(acmeRelay, token)
2020-06-03 07:47:06 +00:00
if nil != err {
2020-06-09 00:58:52 +00:00
fmt.Fprintf(os.Stderr, "%s\n", err)
os.Exit(1)
return
2020-05-05 06:44:21 +00:00
}
2020-06-03 07:47:06 +00:00
acme := &telebit.ACME{
Email: *email,
StoragePath: *certpath,
Agree: *acmeAgree,
Directory: *acmeDirectory,
DNSProvider: provider,
EnableHTTPChallenge: *enableHTTP01,
EnableTLSALPNChallenge: *enableTLSALPN01,
2017-04-04 18:09:20 +00:00
}
2020-06-09 00:58:52 +00:00
//mux := telebit.NewRouteMux(acme)
2020-06-03 07:47:06 +00:00
mux := telebit.NewRouteMux()
// Port forward without TerminatingTLS
for _, fwd := range portForwards {
fmt.Println("Fwd:", fwd.pattern, fwd.port)
mux.ForwardTCP(fwd.pattern, "localhost:"+fwd.port, 120*time.Second)
}
2020-06-03 07:47:06 +00:00
mux.HandleTLS("*", acme, mux)
for _, fwd := range forwards {
2020-06-09 10:41:38 +00:00
//mux.ForwardTCP("*", "localhost:"+fwd.port, 120*time.Second)
mux.ForwardTCP(fwd.pattern, "localhost:"+fwd.port, 120*time.Second)
2020-05-05 06:44:21 +00:00
}
2020-06-09 00:58:52 +00:00
done := make(chan error)
for _, addr := range bindAddrs {
go func() {
fmt.Printf("Listening on %s\n", addr)
ln, err := net.Listen("tcp", addr)
if nil != err {
fmt.Fprintf(os.Stderr, "failed to bind to %q: %s", addr, err)
done <- err
return
}
if err := telebit.Serve(ln, mux); nil != err {
fmt.Fprintf(os.Stderr, "failed to bind to %q: %s", addr, err)
done <- err
return
}
}()
}
//connected := make(chan net.Conn)
2020-06-03 07:47:06 +00:00
go func() {
2020-06-09 00:58:52 +00:00
if "" == *relay {
return
}
2020-06-03 07:47:06 +00:00
timeoutCtx, cancel := context.WithDeadline(context.Background(), time.Now().Add(10*time.Second))
defer cancel()
tun, err := telebit.DialWebsocketTunnel(timeoutCtx, *relay, *token)
if nil != err {
msg := ""
if strings.Contains(err.Error(), "bad handshake") {
msg = " (may be auth related)"
}
fmt.Fprintf(os.Stderr, "Error connecting to %s: %s%s\n", *relay, err, msg)
os.Exit(1)
return
2017-04-04 18:09:20 +00:00
}
2020-06-03 07:47:06 +00:00
err = mgmt.Ping(*authURL, *token)
if nil != err {
2020-06-09 00:58:52 +00:00
fmt.Fprintf(os.Stderr, "failed to ping mgmt server: %s\n", err)
2020-06-03 07:47:06 +00:00
//os.Exit(1)
2017-04-04 18:09:20 +00:00
}
2020-06-09 00:58:52 +00:00
go func() {
for {
time.Sleep(10 * time.Minute)
err = mgmt.Ping(*authURL, *token)
if nil != err {
fmt.Fprintf(os.Stderr, "failed to ping mgmt server: %s\n", err)
//os.Exit(1)
}
}
}()
//connected <- tun
//tun := <-connected
fmt.Printf("Listening at %s\n", *relay)
err = telebit.ListenAndServe(tun, mux)
log.Fatal("Closed server: ", err)
done <- err
2020-06-03 07:47:06 +00:00
}()
2020-05-06 17:11:13 +00:00
2020-06-09 00:58:52 +00:00
if err := <-done; nil != err {
os.Exit(1)
}
}
func parsePortForwards(portToPorts *string) ([]Forward, error) {
var portForwards []Forward
for _, cfg := range strings.Fields(strings.ReplaceAll(*portToPorts, ",", " ")) {
parts := strings.Split(cfg, ":")
if 2 != len(parts) {
return nil, fmt.Errorf("--port-forward should be in the format 1234:5678, not %q", cfg)
}
if _, err := strconv.Atoi(parts[0]); nil != err {
return nil, fmt.Errorf("couldn't parse port %q of %q", parts[0], cfg)
}
if _, err := strconv.Atoi(parts[1]); nil != err {
return nil, fmt.Errorf("couldn't parse port %q of %q", parts[1], cfg)
}
portForwards = append(portForwards, Forward{
pattern: ":" + parts[0],
port: parts[1],
})
}
return portForwards, nil
}
2020-06-09 00:58:52 +00:00
func parseBindAddrs(bindAddrsStr string) ([]string, error) {
bindAddrs := []string{}
for _, addr := range strings.Fields(strings.ReplaceAll(bindAddrsStr, ",", " ")) {
parts := strings.Split(addr, ":")
if len(parts) > 2 {
return nil, fmt.Errorf("too many colons (:) in bind address %s", addr)
2020-06-03 07:47:06 +00:00
}
2020-06-09 00:58:52 +00:00
if "" == addr || "" == parts[0] {
continue
}
var hostname, port string
if 2 == len(parts) {
hostname = parts[0]
port = parts[1]
} else {
port = parts[0]
}
if _, err := strconv.Atoi(port); nil != err {
return nil, fmt.Errorf("couldn't parse port of %q", addr)
}
bindAddrs = append(bindAddrs, hostname+":"+port)
}
return bindAddrs, nil
}
func getACMEProvider(acmeRelay, token *string) (challenge.Provider, error) {
var err error
var provider challenge.Provider = nil
if "" != os.Getenv("GODADDY_API_KEY") {
id := os.Getenv("GODADDY_API_KEY")
apiSecret := os.Getenv("GODADDY_API_SECRET")
if provider, err = newGoDaddyDNSProvider(id, apiSecret); nil != err {
return nil, err
}
} else if "" != os.Getenv("DUCKDNS_TOKEN") {
if provider, err = newDuckDNSProvider(os.Getenv("DUCKDNS_TOKEN")); nil != err {
return nil, err
}
} else {
if "" == *acmeRelay {
return nil, fmt.Errorf("No relay for ACME DNS-01 challenges given to --acme-relay")
}
endpoint := *acmeRelay
if strings.HasSuffix(endpoint, "/") {
endpoint = endpoint[:len(endpoint)-1]
}
//endpoint += "/api/dns/"
if provider, err = newAPIDNSProvider(endpoint, *token); nil != err {
return nil, err
}
}
2020-05-06 17:11:13 +00:00
2020-06-09 00:58:52 +00:00
return provider, nil
2020-06-03 07:47:06 +00:00
}
2020-05-05 06:44:21 +00:00
2020-06-03 07:47:06 +00:00
type ACMEProvider struct {
BaseURL string
provider challenge.Provider
2020-05-05 06:44:21 +00:00
}
2020-06-03 07:47:06 +00:00
func (p *ACMEProvider) Present(domain, token, keyAuth string) error {
return p.provider.Present(domain, token, keyAuth)
}
func (p *ACMEProvider) CleanUp(domain, token, keyAuth string) error {
return p.provider.CleanUp(domain, token, keyAuth)
2020-05-06 17:11:13 +00:00
}
// newDuckDNSProvider is for the sake of demoing the tunnel
func newDuckDNSProvider(token string) (*duckdns.DNSProvider, error) {
config := duckdns.NewDefaultConfig()
config.Token = token
return duckdns.NewDNSProviderConfig(config)
}
2020-06-03 07:47:06 +00:00
// newGoDaddyDNSProvider is for the sake of demoing the tunnel
func newGoDaddyDNSProvider(id, secret string) (*godaddy.DNSProvider, error) {
config := godaddy.NewDefaultConfig()
config.APIKey = id
config.APISecret = secret
return godaddy.NewDNSProviderConfig(config)
}
// newAPIDNSProvider is for the sake of demoing the tunnel
func newAPIDNSProvider(baseURL string, token string) (*dns01.DNSProvider, error) {
config := dns01.NewDefaultConfig()
config.Token = token
endpoint, err := url.Parse(baseURL)
if nil != err {
return nil, err
}
config.Endpoint = endpoint
return dns01.NewDNSProviderConfig(config)
}
/*
// TODO for http proxy
return mplexer.TargetOptions {
Hostname // default localhost
Termination // default TLS
XFWD // default... no?
Port // default 0
Conn // should be dialed beforehand
}, nil
*/
/*
t := telebit.New(token)
mux := telebit.RouteMux{}
mux.HandleTLS("*", mux) // go back to itself
mux.HandleProxy("example.com", "localhost:3000")
mux.HandleTCP("example.com", func (c *telebit.Conn) {
return httpmux.Serve()
})
l := t.Listen("wss://example.com")
conn := l.Accept()
telebit.Serve(listener, mux)
t.ListenAndServe("wss://example.com", mux)
*/
func getToken(secret string, domains, ports []string) (token string, err error) {
tokenData := jwt.MapClaims{"domains": domains, "ports": ports}
2020-06-03 07:47:06 +00:00
jwtToken := jwt.NewWithClaims(jwt.SigningMethodHS256, tokenData)
if token, err = jwtToken.SignedString([]byte(secret)); err != nil {
return "", err
2020-05-05 06:44:21 +00:00
}
2020-06-03 07:47:06 +00:00
return token, nil
}