2020-08-07 12:29:53 +00:00
package tunnel
import (
"encoding/json"
"fmt"
"io/ioutil"
"os"
"path/filepath"
"strings"
2020-10-15 20:08:57 +00:00
"github.com/google/uuid"
"github.com/pkg/errors"
"github.com/urfave/cli/v2"
2020-08-07 12:29:53 +00:00
"github.com/cloudflare/cloudflared/certutil"
"github.com/cloudflare/cloudflared/cmd/cloudflared/config"
2020-10-08 10:12:26 +00:00
"github.com/cloudflare/cloudflared/connection"
2020-08-07 12:29:53 +00:00
"github.com/cloudflare/cloudflared/logger"
"github.com/cloudflare/cloudflared/tunnelrpc/pogs"
"github.com/cloudflare/cloudflared/tunnelstore"
)
2020-11-10 18:27:52 +00:00
type errInvalidJSONCredential struct {
err error
path string
}
func ( e errInvalidJSONCredential ) Error ( ) string {
return "Invalid JSON when parsing tunnel credentials file"
}
2020-09-01 16:06:00 +00:00
// subcommandContext carries structs shared between subcommands, to reduce number of arguments needed to
// pass between subcommands, and make sure they are only initialized once
2020-08-07 12:29:53 +00:00
type subcommandContext struct {
2020-09-01 16:06:00 +00:00
c * cli . Context
logger logger . Service
2020-08-07 12:29:53 +00:00
// These fields should be accessed using their respective Getter
tunnelstoreClient tunnelstore . Client
userCredential * userCredential
2020-09-01 16:06:00 +00:00
isUIEnabled bool
2020-08-07 12:29:53 +00:00
}
func newSubcommandContext ( c * cli . Context ) ( * subcommandContext , error ) {
2020-09-01 16:06:00 +00:00
isUIEnabled := c . IsSet ( uiFlag ) && c . String ( "name" ) != ""
2020-07-29 22:48:27 +00:00
2020-09-01 16:06:00 +00:00
// If UI is enabled, terminal log output should be disabled -- log should be written into a UI log window instead
logger , err := createLogger ( c , false , isUIEnabled )
2020-08-07 12:29:53 +00:00
if err != nil {
return nil , errors . Wrap ( err , "error setting up logger" )
}
2020-09-01 16:06:00 +00:00
2020-08-07 12:29:53 +00:00
return & subcommandContext {
2020-09-01 16:06:00 +00:00
c : c ,
logger : logger ,
isUIEnabled : isUIEnabled ,
2020-08-07 12:29:53 +00:00
} , nil
}
type userCredential struct {
cert * certutil . OriginCert
certPath string
}
func ( sc * subcommandContext ) client ( ) ( tunnelstore . Client , error ) {
if sc . tunnelstoreClient != nil {
return sc . tunnelstoreClient , nil
}
credential , err := sc . credential ( )
if err != nil {
return nil , err
}
2020-09-09 09:34:26 +00:00
userAgent := fmt . Sprintf ( "cloudflared/%s" , version )
client , err := tunnelstore . NewRESTClient ( sc . c . String ( "api-url" ) , credential . cert . AccountID , credential . cert . ZoneID , credential . cert . ServiceKey , userAgent , sc . logger )
2020-08-07 12:29:53 +00:00
if err != nil {
return nil , err
}
sc . tunnelstoreClient = client
return client , nil
}
func ( sc * subcommandContext ) credential ( ) ( * userCredential , error ) {
if sc . userCredential == nil {
originCertPath , err := findOriginCert ( sc . c , sc . logger )
if err != nil {
return nil , errors . Wrap ( err , "Error locating origin cert" )
}
blocks , err := readOriginCert ( originCertPath , sc . logger )
if err != nil {
return nil , errors . Wrapf ( err , "Can't read origin cert from %s" , originCertPath )
}
cert , err := certutil . DecodeOriginCert ( blocks )
if err != nil {
return nil , errors . Wrap ( err , "Error decoding origin cert" )
}
if cert . AccountID == "" {
return nil , errors . Errorf ( ` Origin certificate needs to be refreshed before creating new tunnels.\nDelete %s and run "cloudflared login" to obtain a new cert. ` , originCertPath )
}
sc . userCredential = & userCredential {
cert : cert ,
certPath : originCertPath ,
}
}
return sc . userCredential , nil
}
func ( sc * subcommandContext ) readTunnelCredentials ( tunnelID uuid . UUID ) ( * pogs . TunnelAuth , error ) {
filePath , err := sc . tunnelCredentialsPath ( tunnelID )
if err != nil {
return nil , err
}
body , err := ioutil . ReadFile ( filePath )
if err != nil {
return nil , errors . Wrapf ( err , "couldn't read tunnel credentials from %v" , filePath )
}
var auth pogs . TunnelAuth
if err = json . Unmarshal ( body , & auth ) ; err != nil {
2020-11-10 18:27:52 +00:00
return nil , errInvalidJSONCredential { path : filePath , err : err }
2020-08-07 12:29:53 +00:00
}
return & auth , nil
}
func ( sc * subcommandContext ) tunnelCredentialsPath ( tunnelID uuid . UUID ) ( string , error ) {
if filePath := sc . c . String ( "credentials-file" ) ; filePath != "" {
if validFilePath ( filePath ) {
return filePath , nil
}
2020-10-19 22:33:40 +00:00
return "" , fmt . Errorf ( "Tunnel credentials file %s doesn't exist or is not a file" , filePath )
2020-08-07 12:29:53 +00:00
}
// Fallback to look for tunnel credentials in the origin cert directory
if originCertPath , err := findOriginCert ( sc . c , sc . logger ) ; err == nil {
originCertDir := filepath . Dir ( originCertPath )
if filePath , err := tunnelFilePath ( tunnelID , originCertDir ) ; err == nil {
if validFilePath ( filePath ) {
return filePath , nil
}
}
}
// Last resort look under default config directories
2020-08-14 20:52:47 +00:00
for _ , configDir := range config . DefaultConfigSearchDirectories ( ) {
2020-08-07 12:29:53 +00:00
if filePath , err := tunnelFilePath ( tunnelID , configDir ) ; err == nil {
if validFilePath ( filePath ) {
return filePath , nil
}
}
}
return "" , fmt . Errorf ( "Tunnel credentials file not found" )
}
func ( sc * subcommandContext ) create ( name string ) ( * tunnelstore . Tunnel , error ) {
client , err := sc . client ( )
if err != nil {
2020-08-18 21:54:05 +00:00
return nil , errors . Wrap ( err , "couldn't create client to talk to Argo Tunnel backend" )
2020-08-07 12:29:53 +00:00
}
tunnelSecret , err := generateTunnelSecret ( )
if err != nil {
2020-08-18 21:54:05 +00:00
return nil , errors . Wrap ( err , "couldn't generate the secret for your new tunnel" )
2020-08-07 12:29:53 +00:00
}
tunnel , err := client . CreateTunnel ( name , tunnelSecret )
if err != nil {
2020-08-18 21:54:05 +00:00
return nil , errors . Wrap ( err , "Create Tunnel API call failed" )
2020-08-07 12:29:53 +00:00
}
credential , err := sc . credential ( )
if err != nil {
return nil , err
}
if writeFileErr := writeTunnelCredentials ( tunnel . ID , credential . cert . AccountID , credential . certPath , tunnelSecret , sc . logger ) ; err != nil {
var errorLines [ ] string
errorLines = append ( errorLines , fmt . Sprintf ( "Your tunnel '%v' was created with ID %v. However, cloudflared couldn't write to the tunnel credentials file at %v.json." , tunnel . Name , tunnel . ID , tunnel . ID ) )
errorLines = append ( errorLines , fmt . Sprintf ( "The file-writing error is: %v" , writeFileErr ) )
if deleteErr := client . DeleteTunnel ( tunnel . ID ) ; deleteErr != nil {
errorLines = append ( errorLines , fmt . Sprintf ( "Cloudflared tried to delete the tunnel for you, but encountered an error. You should use `cloudflared tunnel delete %v` to delete the tunnel yourself, because the tunnel can't be run without the tunnelfile." , tunnel . ID ) )
errorLines = append ( errorLines , fmt . Sprintf ( "The delete tunnel error is: %v" , deleteErr ) )
} else {
errorLines = append ( errorLines , fmt . Sprintf ( "The tunnel was deleted, because the tunnel can't be run without the tunnelfile" ) )
}
errorMsg := strings . Join ( errorLines , "\n" )
return nil , errors . New ( errorMsg )
}
if outputFormat := sc . c . String ( outputFormatFlag . Name ) ; outputFormat != "" {
return nil , renderOutput ( outputFormat , & tunnel )
}
sc . logger . Infof ( "Created tunnel %s with id %s" , tunnel . Name , tunnel . ID )
return tunnel , nil
}
func ( sc * subcommandContext ) list ( filter * tunnelstore . Filter ) ( [ ] * tunnelstore . Tunnel , error ) {
client , err := sc . client ( )
if err != nil {
return nil , err
}
return client . ListTunnels ( filter )
}
func ( sc * subcommandContext ) delete ( tunnelIDs [ ] uuid . UUID ) error {
forceFlagSet := sc . c . Bool ( "force" )
client , err := sc . client ( )
if err != nil {
return err
}
for _ , id := range tunnelIDs {
tunnel , err := client . GetTunnel ( id )
if err != nil {
return errors . Wrapf ( err , "Can't get tunnel information. Please check tunnel id: %s" , tunnel . ID )
}
// Check if tunnel DeletedAt field has already been set
if ! tunnel . DeletedAt . IsZero ( ) {
return fmt . Errorf ( "Tunnel %s has already been deleted" , tunnel . ID )
}
// Check if tunnel has existing connections and if force flag is set, cleanup connections
if len ( tunnel . Connections ) > 0 {
if ! forceFlagSet {
return fmt . Errorf ( "You can not delete tunnel %s because it has active connections. To see connections run the 'list' command. If you believe the tunnel is not active, you can use a -f / --force flag with this command." , id )
}
if err := client . CleanupConnections ( tunnel . ID ) ; err != nil {
return errors . Wrapf ( err , "Error cleaning up connections for tunnel %s" , tunnel . ID )
}
}
if err := client . DeleteTunnel ( tunnel . ID ) ; err != nil {
return errors . Wrapf ( err , "Error deleting tunnel %s" , tunnel . ID )
}
tunnelCredentialsPath , err := sc . tunnelCredentialsPath ( tunnel . ID )
if err != nil {
sc . logger . Infof ( "Cannot locate tunnel credentials to delete, error: %v. Please delete the file manually" , err )
return nil
}
if err = os . Remove ( tunnelCredentialsPath ) ; err != nil {
sc . logger . Infof ( "Cannot delete tunnel credentials, error: %v. Please delete the file manually" , err )
}
}
return nil
}
func ( sc * subcommandContext ) run ( tunnelID uuid . UUID ) error {
credentials , err := sc . readTunnelCredentials ( tunnelID )
if err != nil {
2020-11-10 18:27:52 +00:00
if e , ok := err . ( errInvalidJSONCredential ) ; ok {
sc . logger . Errorf ( "The credentials file at %s contained invalid JSON. This is probably caused by passing the wrong filepath. Reminder: the credentials file is a .json file created via `cloudflared tunnel create`." , e . path )
sc . logger . Errorf ( "Invalid JSON when parsing credentials file: %s" , e . err . Error ( ) )
}
2020-08-07 12:29:53 +00:00
return err
}
2020-07-29 22:48:27 +00:00
2020-10-08 10:12:26 +00:00
protocol , ok := connection . ParseProtocol ( sc . c . String ( "protocol" ) )
2020-10-08 09:48:10 +00:00
if ! ok {
return fmt . Errorf ( "%s is not valid protocol. %s" , sc . c . String ( "protocol" ) , availableProtocol )
}
2020-09-01 16:06:00 +00:00
return StartServer (
sc . c ,
version ,
shutdownC ,
graceShutdownC ,
2020-10-08 10:12:26 +00:00
& connection . NamedTunnelConfig { Auth : * credentials , ID : tunnelID , Protocol : protocol } ,
2020-09-01 16:06:00 +00:00
sc . logger ,
sc . isUIEnabled ,
)
2020-08-07 12:29:53 +00:00
}
func ( sc * subcommandContext ) cleanupConnections ( tunnelIDs [ ] uuid . UUID ) error {
client , err := sc . client ( )
if err != nil {
return err
}
for _ , tunnelID := range tunnelIDs {
sc . logger . Infof ( "Cleanup connection for tunnel %s" , tunnelID )
if err := client . CleanupConnections ( tunnelID ) ; err != nil {
sc . logger . Errorf ( "Error cleaning up connections for tunnel %v, error :%v" , tunnelID , err )
}
}
return nil
}
2020-09-17 20:19:47 +00:00
func ( sc * subcommandContext ) route ( tunnelID uuid . UUID , r tunnelstore . Route ) ( tunnelstore . RouteResult , error ) {
2020-08-07 12:29:53 +00:00
client , err := sc . client ( )
if err != nil {
2020-09-17 20:19:47 +00:00
return nil , err
2020-08-07 12:29:53 +00:00
}
2020-09-17 20:19:47 +00:00
return client . RouteTunnel ( tunnelID , r )
2020-08-07 12:29:53 +00:00
}
func ( sc * subcommandContext ) tunnelActive ( name string ) ( * tunnelstore . Tunnel , bool , error ) {
filter := tunnelstore . NewFilter ( )
filter . NoDeleted ( )
filter . ByName ( name )
tunnels , err := sc . list ( filter )
if err != nil {
return nil , false , err
}
if len ( tunnels ) == 0 {
return nil , false , nil
}
// There should only be 1 active tunnel for a given name
return tunnels [ 0 ] , true , nil
}
2020-08-18 21:54:05 +00:00
// findID parses the input. If it's a UUID, return the UUID.
// Otherwise, assume it's a name, and look up the ID of that tunnel.
func ( sc * subcommandContext ) findID ( input string ) ( uuid . UUID , error ) {
if u , err := uuid . Parse ( input ) ; err == nil {
return u , nil
}
if tunnel , found , err := sc . tunnelActive ( input ) ; err != nil {
return uuid . Nil , err
} else if found {
return tunnel . ID , nil
}
return uuid . Nil , fmt . Errorf ( "%s is neither the ID nor the name of any of your tunnels" , input )
}
// findIDs is just like mapping `findID` over a slice, but it only uses
// one Tunnelstore API call.
func ( sc * subcommandContext ) findIDs ( inputs [ ] string ) ( [ ] uuid . UUID , error ) {
// First, look up all tunnels the user has
filter := tunnelstore . NewFilter ( )
filter . NoDeleted ( )
tunnels , err := sc . list ( filter )
if err != nil {
return nil , err
}
// Do the pure list-processing in its own function, so that it can be
// unit tested easily.
return findIDs ( tunnels , inputs )
}
func findIDs ( tunnels [ ] * tunnelstore . Tunnel , inputs [ ] string ) ( [ ] uuid . UUID , error ) {
// Put them into a dictionary for faster lookups
nameToID := make ( map [ string ] uuid . UUID , len ( tunnels ) )
for _ , tunnel := range tunnels {
nameToID [ tunnel . Name ] = tunnel . ID
}
// For each input, try to find the tunnel ID.
tunnelIDs := make ( [ ] uuid . UUID , len ( inputs ) )
var badInputs [ ] string
for i , input := range inputs {
if id , err := uuid . Parse ( input ) ; err == nil {
tunnelIDs [ i ] = id
} else if id , ok := nameToID [ input ] ; ok {
tunnelIDs [ i ] = id
} else {
badInputs = append ( badInputs , input )
}
}
if len ( badInputs ) > 0 {
msg := "Please specify either the ID or name of a tunnel. The following inputs were neither: %s"
return nil , fmt . Errorf ( msg , strings . Join ( badInputs , ", " ) )
}
return tunnelIDs , nil
}