aboutsummaryrefslogtreecommitdiff
path: root/tun2/client.go
blob: d7a3982a3f45a42dad9dfc15ee67faecb0497658 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
package tun2

import (
	"context"
	"crypto/tls"
	"encoding/json"
	"errors"
	"io"
	"net"
	"net/http"
	"net/http/httputil"
	"net/url"

	"within.website/ln"
	"within.website/ln/opname"
	kcp "github.com/xtaci/kcp-go"
	"github.com/xtaci/smux"
)

// Client connects to a remote tun2 server and sets up authentication before routing
// individual HTTP requests to discrete streams that are reverse proxied to the eventual
// backend.
type Client struct {
	cfg *ClientConfig
}

// ClientConfig configures client with settings that the user provides.
type ClientConfig struct {
	TLSConfig  *tls.Config
	ConnType   string
	ServerAddr string
	Token      string
	Domain     string
	BackendURL string

	// internal use only
	forceTCPClear bool
}

// NewClient constructs an instance of Client with a given ClientConfig.
func NewClient(cfg *ClientConfig) (*Client, error) {
	if cfg == nil {
		return nil, errors.New("tun2: client config needed")
	}

	c := &Client{
		cfg: cfg,
	}

	return c, nil
}

// Connect dials the remote server and negotiates a client session with its
// configured server address. This will then continuously proxy incoming HTTP
// requests to the backend HTTP server.
//
// This is a blocking function.
func (c *Client) Connect(ctx context.Context) error {
	ctx = opname.With(ctx, "tun2.Client.connect")
	return c.connect(ctx, c.cfg.ServerAddr)
}

func closeLater(ctx context.Context, clo io.Closer) {
	<-ctx.Done()
	clo.Close()
}

func (c *Client) connect(ctx context.Context, serverAddr string) error {
	target, err := url.Parse(c.cfg.BackendURL)
	if err != nil {
		return err
	}

	s := &http.Server{
		Handler: httputil.NewSingleHostReverseProxy(target),
	}
	go closeLater(ctx, s)

	f := ln.F{
		"server_addr": serverAddr,
		"conn_type":   c.cfg.ConnType,
	}

	var conn net.Conn

	switch c.cfg.ConnType {
	case "tcp":
		if c.cfg.forceTCPClear {
			ln.Log(ctx, f, ln.Info("connecting over plain TCP"))
			conn, err = net.Dial("tcp", serverAddr)
		} else {
			conn, err = tls.Dial("tcp", serverAddr, c.cfg.TLSConfig)
		}

		if err != nil {
			return err
		}

	case "kcp":
		kc, err := kcp.Dial(serverAddr)
		if err != nil {
			return err
		}
		defer kc.Close()

		serverHost, _, _ := net.SplitHostPort(serverAddr)

		tc := c.cfg.TLSConfig.Clone()
		tc.ServerName = serverHost
		conn = tls.Client(kc, tc)
	}
	go closeLater(ctx, conn)

	ln.Log(ctx, f, ln.Info("connected"))

	session, err := smux.Client(conn, smux.DefaultConfig())
	if err != nil {
		return err
	}
	go closeLater(ctx, session)

	controlStream, err := session.AcceptStream()
	if err != nil {
		return err
	}
	go closeLater(ctx, controlStream)

	authData, err := json.Marshal(&Auth{
		Token:  c.cfg.Token,
		Domain: c.cfg.Domain,
	})
	if err != nil {
		return err
	}

	_, err = controlStream.Write(authData)
	if err != nil {
		return err
	}

	err = s.Serve(&smuxListener{
		conn:    conn,
		session: session,
	})
	if err != nil {
		return err
	}

	if err := ctx.Err(); err != nil {
		ln.Error(ctx, err, f, ln.Info("context error"))
	}
	return nil
}

// smuxListener wraps a smux session as a net.Listener.
type smuxListener struct {
	conn    net.Conn
	session *smux.Session
}

func (sl *smuxListener) Accept() (net.Conn, error) {
	return sl.session.AcceptStream()
}

func (sl *smuxListener) Addr() net.Addr {
	return sl.conn.LocalAddr()
}

func (sl *smuxListener) Close() error {
	return sl.session.Close()
}