2020-10-15 21:41:03 +00:00
|
|
|
package ingress
|
|
|
|
|
|
|
|
import (
|
2020-10-30 21:37:40 +00:00
|
|
|
"context"
|
|
|
|
"crypto/tls"
|
2020-10-15 21:41:03 +00:00
|
|
|
"fmt"
|
2020-11-05 13:37:30 +00:00
|
|
|
"io"
|
2020-10-15 21:41:03 +00:00
|
|
|
"net"
|
|
|
|
"net/http"
|
|
|
|
"net/url"
|
|
|
|
"strconv"
|
|
|
|
"sync"
|
2020-10-30 21:37:40 +00:00
|
|
|
"time"
|
2020-10-15 21:41:03 +00:00
|
|
|
|
|
|
|
"github.com/cloudflare/cloudflared/hello"
|
|
|
|
"github.com/cloudflare/cloudflared/socks"
|
2020-10-30 21:37:40 +00:00
|
|
|
"github.com/cloudflare/cloudflared/tlsconfig"
|
2020-10-15 21:41:03 +00:00
|
|
|
"github.com/cloudflare/cloudflared/websocket"
|
2020-10-30 21:37:40 +00:00
|
|
|
gws "github.com/gorilla/websocket"
|
2020-10-15 21:41:03 +00:00
|
|
|
"github.com/pkg/errors"
|
2020-11-25 06:55:13 +00:00
|
|
|
"github.com/rs/zerolog"
|
2020-10-15 21:41:03 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// OriginService is something a tunnel can proxy traffic to.
|
|
|
|
type OriginService interface {
|
2020-10-30 21:37:40 +00:00
|
|
|
// RoundTrip is how cloudflared proxies eyeball requests to the actual origin services
|
|
|
|
http.RoundTripper
|
|
|
|
String() string
|
2020-10-15 21:41:03 +00:00
|
|
|
// Start the origin service if it's managed by cloudflared, e.g. proxy servers or Hello World.
|
|
|
|
// If it's not managed by cloudflared, this is a no-op because the user is responsible for
|
|
|
|
// starting the origin service.
|
2020-11-25 06:55:13 +00:00
|
|
|
start(wg *sync.WaitGroup, log *zerolog.Logger, shutdownC <-chan struct{}, errC chan error, cfg OriginRequestConfig) error
|
2020-10-15 21:41:03 +00:00
|
|
|
}
|
|
|
|
|
2020-10-30 21:37:40 +00:00
|
|
|
// unixSocketPath is an OriginService representing a unix socket (which accepts HTTP)
|
|
|
|
type unixSocketPath struct {
|
|
|
|
path string
|
|
|
|
transport *http.Transport
|
2020-10-15 21:41:03 +00:00
|
|
|
}
|
|
|
|
|
2020-10-30 21:37:40 +00:00
|
|
|
func (o *unixSocketPath) String() string {
|
|
|
|
return "unix socket: " + o.path
|
2020-10-15 21:41:03 +00:00
|
|
|
}
|
|
|
|
|
2020-11-25 06:55:13 +00:00
|
|
|
func (o *unixSocketPath) start(wg *sync.WaitGroup, log *zerolog.Logger, shutdownC <-chan struct{}, errC chan error, cfg OriginRequestConfig) error {
|
2020-11-15 02:03:29 +00:00
|
|
|
transport, err := newHTTPTransport(o, cfg, log)
|
2020-10-30 21:37:40 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
o.transport = transport
|
2020-10-15 21:41:03 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-10-30 21:37:40 +00:00
|
|
|
func (o *unixSocketPath) RoundTrip(req *http.Request) (*http.Response, error) {
|
|
|
|
return o.transport.RoundTrip(req)
|
2020-10-15 21:41:03 +00:00
|
|
|
}
|
|
|
|
|
2020-11-05 13:52:46 +00:00
|
|
|
func (o *unixSocketPath) Dial(reqURL *url.URL, headers http.Header) (*gws.Conn, *http.Response, error) {
|
|
|
|
d := &gws.Dialer{
|
|
|
|
NetDial: o.transport.Dial,
|
|
|
|
NetDialContext: o.transport.DialContext,
|
|
|
|
TLSClientConfig: o.transport.TLSClientConfig,
|
|
|
|
}
|
|
|
|
reqURL.Scheme = websocket.ChangeRequestScheme(reqURL)
|
|
|
|
return d.Dial(reqURL.String(), headers)
|
2020-10-30 21:37:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// localService is an OriginService listening on a TCP/IP address the user's origin can route to.
|
|
|
|
type localService struct {
|
2020-10-15 21:41:03 +00:00
|
|
|
// The URL for the user's origin service
|
|
|
|
RootURL *url.URL
|
|
|
|
// The URL that cloudflared should send requests to.
|
|
|
|
// If this origin requires starting a proxy, this is the proxy's address,
|
|
|
|
// and that proxy points to RootURL. Otherwise, this is equal to RootURL.
|
2020-10-30 21:37:40 +00:00
|
|
|
URL *url.URL
|
|
|
|
transport *http.Transport
|
2020-10-15 21:41:03 +00:00
|
|
|
}
|
|
|
|
|
2020-11-05 13:52:46 +00:00
|
|
|
func (o *localService) Dial(reqURL *url.URL, headers http.Header) (*gws.Conn, *http.Response, error) {
|
2020-10-30 21:37:40 +00:00
|
|
|
d := &gws.Dialer{TLSClientConfig: o.transport.TLSClientConfig}
|
2020-11-05 13:52:46 +00:00
|
|
|
// Rewrite the request URL so that it goes to the origin service.
|
|
|
|
reqURL.Host = o.URL.Host
|
|
|
|
reqURL.Scheme = websocket.ChangeRequestScheme(o.URL)
|
|
|
|
return d.Dial(reqURL.String(), headers)
|
2020-10-30 21:37:40 +00:00
|
|
|
}
|
|
|
|
|
2020-11-25 06:55:13 +00:00
|
|
|
func (o *localService) start(wg *sync.WaitGroup, log *zerolog.Logger, shutdownC <-chan struct{}, errC chan error, cfg OriginRequestConfig) error {
|
2020-11-15 02:03:29 +00:00
|
|
|
transport, err := newHTTPTransport(o, cfg, log)
|
2020-10-30 21:37:40 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
o.transport = transport
|
|
|
|
|
|
|
|
// Start a proxy if one is needed
|
2020-11-15 18:47:51 +00:00
|
|
|
if staticHost := o.staticHost(); originRequiresProxy(staticHost, cfg) {
|
2020-10-30 21:37:40 +00:00
|
|
|
if err := o.startProxy(staticHost, wg, log, shutdownC, errC, cfg); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-10-15 21:41:03 +00:00
|
|
|
}
|
|
|
|
|
2020-10-30 21:37:40 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-11-25 06:55:13 +00:00
|
|
|
func (o *localService) startProxy(staticHost string, wg *sync.WaitGroup, log *zerolog.Logger, shutdownC <-chan struct{}, errC chan error, cfg OriginRequestConfig) error {
|
2020-10-30 21:37:40 +00:00
|
|
|
|
2020-10-15 21:41:03 +00:00
|
|
|
// Start a listener for the proxy
|
|
|
|
proxyAddress := net.JoinHostPort(cfg.ProxyAddress, strconv.Itoa(int(cfg.ProxyPort)))
|
|
|
|
listener, err := net.Listen("tcp", proxyAddress)
|
|
|
|
if err != nil {
|
2020-11-25 06:55:13 +00:00
|
|
|
log.Error().Msgf("Cannot start Websocket Proxy Server: %s", err)
|
2020-10-15 21:41:03 +00:00
|
|
|
return errors.Wrap(err, "Cannot start Websocket Proxy Server")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start the proxy itself
|
|
|
|
wg.Add(1)
|
|
|
|
go func() {
|
|
|
|
defer wg.Done()
|
|
|
|
streamHandler := websocket.DefaultStreamHandler
|
|
|
|
// This origin's config specifies what type of proxy to start.
|
|
|
|
switch cfg.ProxyType {
|
|
|
|
case socksProxy:
|
2020-11-25 06:55:13 +00:00
|
|
|
log.Info().Msg("SOCKS5 server started")
|
2020-10-15 21:41:03 +00:00
|
|
|
streamHandler = func(wsConn *websocket.Conn, remoteConn net.Conn, _ http.Header) {
|
|
|
|
dialer := socks.NewConnDialer(remoteConn)
|
|
|
|
requestHandler := socks.NewRequestHandler(dialer)
|
|
|
|
socksServer := socks.NewConnectionHandler(requestHandler)
|
|
|
|
|
2020-11-25 06:55:13 +00:00
|
|
|
_ = socksServer.Serve(wsConn)
|
2020-10-15 21:41:03 +00:00
|
|
|
}
|
|
|
|
case "":
|
2020-11-25 06:55:13 +00:00
|
|
|
log.Debug().Msg("Not starting any websocket proxy")
|
2020-10-15 21:41:03 +00:00
|
|
|
default:
|
2020-11-25 06:55:13 +00:00
|
|
|
log.Error().Msgf("%s isn't a valid proxy (valid options are {%s})", cfg.ProxyType, socksProxy)
|
2020-10-15 21:41:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
errC <- websocket.StartProxyServer(log, listener, staticHost, shutdownC, streamHandler)
|
|
|
|
}()
|
|
|
|
|
|
|
|
// Modify this origin, so that it no longer points at the origin service directly.
|
|
|
|
// Instead, it points at the proxy to the origin service.
|
|
|
|
newURL, err := url.Parse("http://" + listener.Addr().String())
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
o.URL = newURL
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-10-30 21:37:40 +00:00
|
|
|
func (o *localService) String() string {
|
2020-11-20 17:09:02 +00:00
|
|
|
if o.isBastion() {
|
|
|
|
return "Bastion"
|
|
|
|
}
|
|
|
|
return o.URL.String()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (o *localService) isBastion() bool {
|
|
|
|
return o.URL == nil
|
2020-10-15 21:41:03 +00:00
|
|
|
}
|
|
|
|
|
2020-10-30 21:37:40 +00:00
|
|
|
func (o *localService) RoundTrip(req *http.Request) (*http.Response, error) {
|
|
|
|
// Rewrite the request URL so that it goes to the origin service.
|
|
|
|
req.URL.Host = o.URL.Host
|
|
|
|
req.URL.Scheme = o.URL.Scheme
|
|
|
|
return o.transport.RoundTrip(req)
|
2020-10-15 21:41:03 +00:00
|
|
|
}
|
|
|
|
|
2020-10-30 21:37:40 +00:00
|
|
|
func (o *localService) staticHost() string {
|
2020-10-15 21:41:03 +00:00
|
|
|
|
2020-11-20 17:09:02 +00:00
|
|
|
if o.URL == nil {
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
2020-10-15 21:41:03 +00:00
|
|
|
addPortIfMissing := func(uri *url.URL, port int) string {
|
|
|
|
if uri.Port() != "" {
|
|
|
|
return uri.Host
|
|
|
|
}
|
|
|
|
return fmt.Sprintf("%s:%d", uri.Hostname(), port)
|
|
|
|
}
|
|
|
|
|
|
|
|
switch o.URL.Scheme {
|
|
|
|
case "ssh":
|
|
|
|
return addPortIfMissing(o.URL, 22)
|
|
|
|
case "rdp":
|
|
|
|
return addPortIfMissing(o.URL, 3389)
|
|
|
|
case "smb":
|
|
|
|
return addPortIfMissing(o.URL, 445)
|
|
|
|
case "tcp":
|
|
|
|
return addPortIfMissing(o.URL, 7864) // just a random port since there isn't a default in this case
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2020-10-30 21:37:40 +00:00
|
|
|
// HelloWorld is an OriginService for the built-in Hello World server.
|
|
|
|
// Users only use this for testing and experimenting with cloudflared.
|
|
|
|
type helloWorld struct {
|
|
|
|
server net.Listener
|
|
|
|
transport *http.Transport
|
2020-10-15 21:41:03 +00:00
|
|
|
}
|
|
|
|
|
2020-10-30 21:37:40 +00:00
|
|
|
func (o *helloWorld) String() string {
|
|
|
|
return "Hello World test origin"
|
2020-10-15 21:41:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Start starts a HelloWorld server and stores its address in the Service receiver.
|
2020-11-25 06:55:13 +00:00
|
|
|
func (o *helloWorld) start(
|
|
|
|
wg *sync.WaitGroup,
|
|
|
|
log *zerolog.Logger,
|
|
|
|
shutdownC <-chan struct{},
|
|
|
|
errC chan error,
|
|
|
|
cfg OriginRequestConfig,
|
|
|
|
) error {
|
2020-11-15 02:03:29 +00:00
|
|
|
transport, err := newHTTPTransport(o, cfg, log)
|
2020-10-30 21:37:40 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
o.transport = transport
|
2020-10-15 21:41:03 +00:00
|
|
|
helloListener, err := hello.CreateTLSListener("127.0.0.1:")
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "Cannot start Hello World Server")
|
|
|
|
}
|
|
|
|
wg.Add(1)
|
|
|
|
go func() {
|
|
|
|
defer wg.Done()
|
|
|
|
_ = hello.StartHelloWorldServer(log, helloListener, shutdownC)
|
|
|
|
}()
|
|
|
|
o.server = helloListener
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-10-30 21:37:40 +00:00
|
|
|
func (o *helloWorld) RoundTrip(req *http.Request) (*http.Response, error) {
|
|
|
|
// Rewrite the request URL so that it goes to the Hello World server.
|
|
|
|
req.URL.Host = o.server.Addr().String()
|
|
|
|
req.URL.Scheme = "https"
|
|
|
|
return o.transport.RoundTrip(req)
|
|
|
|
}
|
|
|
|
|
2020-11-05 13:52:46 +00:00
|
|
|
func (o *helloWorld) Dial(reqURL *url.URL, headers http.Header) (*gws.Conn, *http.Response, error) {
|
|
|
|
d := &gws.Dialer{
|
|
|
|
TLSClientConfig: o.transport.TLSClientConfig,
|
|
|
|
}
|
|
|
|
reqURL.Host = o.server.Addr().String()
|
|
|
|
reqURL.Scheme = "wss"
|
|
|
|
return d.Dial(reqURL.String(), headers)
|
2020-10-15 21:41:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func originRequiresProxy(staticHost string, cfg OriginRequestConfig) bool {
|
|
|
|
return staticHost != "" || cfg.BastionMode
|
|
|
|
}
|
2020-10-30 21:37:40 +00:00
|
|
|
|
2020-11-04 18:22:21 +00:00
|
|
|
// statusCode is an OriginService that just responds with a given HTTP status.
|
|
|
|
// Typical use-case is "user wants the catch-all rule to just respond 404".
|
|
|
|
type statusCode struct {
|
|
|
|
resp *http.Response
|
|
|
|
}
|
|
|
|
|
|
|
|
func newStatusCode(status int) statusCode {
|
|
|
|
resp := &http.Response{
|
|
|
|
StatusCode: status,
|
2020-11-02 11:21:34 +00:00
|
|
|
Status: fmt.Sprintf("%d %s", status, http.StatusText(status)),
|
2020-11-04 18:22:21 +00:00
|
|
|
Body: new(NopReadCloser),
|
|
|
|
}
|
|
|
|
return statusCode{resp: resp}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (o *statusCode) String() string {
|
|
|
|
return fmt.Sprintf("HTTP %d", o.resp.StatusCode)
|
|
|
|
}
|
|
|
|
|
2020-11-25 06:55:13 +00:00
|
|
|
func (o *statusCode) start(
|
|
|
|
wg *sync.WaitGroup,
|
|
|
|
log *zerolog.Logger,
|
|
|
|
shutdownC <-chan struct{},
|
|
|
|
errC chan error,
|
|
|
|
cfg OriginRequestConfig,
|
|
|
|
) error {
|
2020-11-04 18:22:21 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (o *statusCode) RoundTrip(_ *http.Request) (*http.Response, error) {
|
|
|
|
return o.resp, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type NopReadCloser struct{}
|
|
|
|
|
2020-11-05 13:37:30 +00:00
|
|
|
// Read always returns EOF to signal end of input
|
2020-11-04 18:22:21 +00:00
|
|
|
func (nrc *NopReadCloser) Read(buf []byte) (int, error) {
|
2020-11-05 13:37:30 +00:00
|
|
|
return 0, io.EOF
|
2020-11-04 18:22:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (nrc *NopReadCloser) Close() error {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-11-25 06:55:13 +00:00
|
|
|
func newHTTPTransport(service OriginService, cfg OriginRequestConfig, log *zerolog.Logger) (*http.Transport, error) {
|
2020-11-15 02:03:29 +00:00
|
|
|
originCertPool, err := tlsconfig.LoadOriginCA(cfg.CAPool, log)
|
2020-10-30 21:37:40 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrap(err, "Error loading cert pool")
|
|
|
|
}
|
|
|
|
|
|
|
|
httpTransport := http.Transport{
|
|
|
|
Proxy: http.ProxyFromEnvironment,
|
|
|
|
MaxIdleConns: cfg.KeepAliveConnections,
|
|
|
|
MaxIdleConnsPerHost: cfg.KeepAliveConnections,
|
|
|
|
IdleConnTimeout: cfg.KeepAliveTimeout,
|
|
|
|
TLSHandshakeTimeout: cfg.TLSTimeout,
|
|
|
|
ExpectContinueTimeout: 1 * time.Second,
|
|
|
|
TLSClientConfig: &tls.Config{RootCAs: originCertPool, InsecureSkipVerify: cfg.NoTLSVerify},
|
|
|
|
}
|
|
|
|
if _, isHelloWorld := service.(*helloWorld); !isHelloWorld && cfg.OriginServerName != "" {
|
|
|
|
httpTransport.TLSClientConfig.ServerName = cfg.OriginServerName
|
|
|
|
}
|
|
|
|
|
|
|
|
dialer := &net.Dialer{
|
|
|
|
Timeout: cfg.ConnectTimeout,
|
|
|
|
KeepAlive: cfg.TCPKeepAlive,
|
|
|
|
}
|
|
|
|
if cfg.NoHappyEyeballs {
|
|
|
|
dialer.FallbackDelay = -1 // As of Golang 1.12, a negative delay disables "happy eyeballs"
|
|
|
|
}
|
|
|
|
|
|
|
|
// DialContext depends on which kind of origin is being used.
|
|
|
|
dialContext := dialer.DialContext
|
|
|
|
switch service := service.(type) {
|
|
|
|
|
|
|
|
// If this origin is a unix socket, enforce network type "unix".
|
|
|
|
case *unixSocketPath:
|
|
|
|
httpTransport.DialContext = func(ctx context.Context, _, _ string) (net.Conn, error) {
|
|
|
|
return dialContext(ctx, "unix", service.path)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Otherwise, use the regular network config.
|
|
|
|
default:
|
|
|
|
httpTransport.DialContext = dialContext
|
|
|
|
}
|
|
|
|
|
|
|
|
return &httpTransport, nil
|
|
|
|
}
|
2020-10-30 11:41:14 +00:00
|
|
|
|
|
|
|
// MockOriginService should only be used by other packages to mock OriginService. Set Transport to configure desired RoundTripper behavior.
|
|
|
|
type MockOriginService struct {
|
|
|
|
Transport http.RoundTripper
|
|
|
|
}
|
|
|
|
|
|
|
|
func (mos MockOriginService) RoundTrip(req *http.Request) (*http.Response, error) {
|
|
|
|
return mos.Transport.RoundTrip(req)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (mos MockOriginService) String() string {
|
|
|
|
return "MockOriginService"
|
|
|
|
}
|
|
|
|
|
2020-11-25 06:55:13 +00:00
|
|
|
func (mos MockOriginService) start(wg *sync.WaitGroup, log *zerolog.Logger, shutdownC <-chan struct{}, errC chan error, cfg OriginRequestConfig) error {
|
2020-10-30 11:41:14 +00:00
|
|
|
return nil
|
|
|
|
}
|