Merge branch 'master' of https://github.com/Bexanderthebex/cloudflared into fix/cloudflared-windows-ssh-config
This commit is contained in:
commit
455001110f
|
@ -9,10 +9,10 @@ jobs:
|
||||||
runs-on: ${{ matrix.os }}
|
runs-on: ${{ matrix.os }}
|
||||||
steps:
|
steps:
|
||||||
- name: Install Go
|
- name: Install Go
|
||||||
uses: actions/setup-go@v2
|
uses: actions/setup-go@v3
|
||||||
with:
|
with:
|
||||||
go-version: ${{ matrix.go-version }}
|
go-version: ${{ matrix.go-version }}
|
||||||
- name: Checkout code
|
- name: Checkout code
|
||||||
uses: actions/checkout@v2
|
uses: actions/checkout@v3
|
||||||
- name: Test
|
- name: Test
|
||||||
run: make test
|
run: make test
|
||||||
|
|
|
@ -1,5 +1,7 @@
|
||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
||||||
|
set -exo pipefail
|
||||||
|
|
||||||
if [[ "$(uname)" != "Darwin" ]] ; then
|
if [[ "$(uname)" != "Darwin" ]] ; then
|
||||||
echo "This should be run on macOS"
|
echo "This should be run on macOS"
|
||||||
exit 1
|
exit 1
|
||||||
|
@ -33,7 +35,9 @@ if [[ ! -z "$CFD_CODE_SIGN_KEY" ]]; then
|
||||||
if [[ ! -z "$CFD_CODE_SIGN_PASS" ]]; then
|
if [[ ! -z "$CFD_CODE_SIGN_PASS" ]]; then
|
||||||
# write private key to disk and then import it keychain
|
# write private key to disk and then import it keychain
|
||||||
echo -n -e ${CFD_CODE_SIGN_KEY} | base64 -D > ${CODE_SIGN_PRIV}
|
echo -n -e ${CFD_CODE_SIGN_KEY} | base64 -D > ${CODE_SIGN_PRIV}
|
||||||
out=$(security import ${CODE_SIGN_PRIV} -A -P "${CFD_CODE_SIGN_PASS}" 2>&1)
|
# we set || true here and for every `security import invoke` because the "duplicate SecKeychainItemImport" error
|
||||||
|
# will cause set -e to exit 1. It is okay we do this because we deliberately handle this error in the lines below.
|
||||||
|
out=$(security import ${CODE_SIGN_PRIV} -A -P "${CFD_CODE_SIGN_PASS}" 2>&1) || true
|
||||||
exitcode=$?
|
exitcode=$?
|
||||||
if [ -n "$out" ]; then
|
if [ -n "$out" ]; then
|
||||||
if [ $exitcode -eq 0 ]; then
|
if [ $exitcode -eq 0 ]; then
|
||||||
|
@ -53,7 +57,7 @@ fi
|
||||||
if [[ ! -z "$CFD_CODE_SIGN_CERT" ]]; then
|
if [[ ! -z "$CFD_CODE_SIGN_CERT" ]]; then
|
||||||
# write certificate to disk and then import it keychain
|
# write certificate to disk and then import it keychain
|
||||||
echo -n -e ${CFD_CODE_SIGN_CERT} | base64 -D > ${CODE_SIGN_CERT}
|
echo -n -e ${CFD_CODE_SIGN_CERT} | base64 -D > ${CODE_SIGN_CERT}
|
||||||
out1=$(security import ${CODE_SIGN_CERT} -A 2>&1)
|
out1=$(security import ${CODE_SIGN_CERT} -A 2>&1) || true
|
||||||
exitcode1=$?
|
exitcode1=$?
|
||||||
if [ -n "$out1" ]; then
|
if [ -n "$out1" ]; then
|
||||||
if [ $exitcode1 -eq 0 ]; then
|
if [ $exitcode1 -eq 0 ]; then
|
||||||
|
@ -75,7 +79,7 @@ if [[ ! -z "$CFD_INSTALLER_KEY" ]]; then
|
||||||
if [[ ! -z "$CFD_INSTALLER_PASS" ]]; then
|
if [[ ! -z "$CFD_INSTALLER_PASS" ]]; then
|
||||||
# write private key to disk and then import it into the keychain
|
# write private key to disk and then import it into the keychain
|
||||||
echo -n -e ${CFD_INSTALLER_KEY} | base64 -D > ${INSTALLER_PRIV}
|
echo -n -e ${CFD_INSTALLER_KEY} | base64 -D > ${INSTALLER_PRIV}
|
||||||
out2=$(security import ${INSTALLER_PRIV} -A -P "${CFD_INSTALLER_PASS}" 2>&1)
|
out2=$(security import ${INSTALLER_PRIV} -A -P "${CFD_INSTALLER_PASS}" 2>&1) || true
|
||||||
exitcode2=$?
|
exitcode2=$?
|
||||||
if [ -n "$out2" ]; then
|
if [ -n "$out2" ]; then
|
||||||
if [ $exitcode2 -eq 0 ]; then
|
if [ $exitcode2 -eq 0 ]; then
|
||||||
|
@ -95,7 +99,7 @@ fi
|
||||||
if [[ ! -z "$CFD_INSTALLER_CERT" ]]; then
|
if [[ ! -z "$CFD_INSTALLER_CERT" ]]; then
|
||||||
# write certificate to disk and then import it keychain
|
# write certificate to disk and then import it keychain
|
||||||
echo -n -e ${CFD_INSTALLER_CERT} | base64 -D > ${INSTALLER_CERT}
|
echo -n -e ${CFD_INSTALLER_CERT} | base64 -D > ${INSTALLER_CERT}
|
||||||
out3=$(security import ${INSTALLER_CERT} -A 2>&1)
|
out3=$(security import ${INSTALLER_CERT} -A 2>&1) || true
|
||||||
exitcode3=$?
|
exitcode3=$?
|
||||||
if [ -n "$out3" ]; then
|
if [ -n "$out3" ]; then
|
||||||
if [ $exitcode3 -eq 0 ]; then
|
if [ $exitcode3 -eq 0 ]; then
|
||||||
|
@ -138,14 +142,10 @@ fi
|
||||||
if [[ ! -z "$CODE_SIGN_NAME" ]]; then
|
if [[ ! -z "$CODE_SIGN_NAME" ]]; then
|
||||||
codesign -s "${CODE_SIGN_NAME}" -f -v --timestamp --options runtime ${BINARY_NAME}
|
codesign -s "${CODE_SIGN_NAME}" -f -v --timestamp --options runtime ${BINARY_NAME}
|
||||||
|
|
||||||
# notarize the binary
|
# notarize the binary
|
||||||
if [[ ! -z "$CFD_NOTE_PASSWORD" ]]; then
|
# TODO: https://jira.cfdata.org/browse/TUN-5789
|
||||||
zip "${BINARY_NAME}.zip" ${BINARY_NAME}
|
|
||||||
xcrun altool --notarize-app -f "${BINARY_NAME}.zip" -t osx -u ${CFD_NOTE_USERNAME} -p ${CFD_NOTE_PASSWORD} --primary-bundle-id ${BUNDLE_ID}
|
|
||||||
fi
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
|
||||||
# creating build directory
|
# creating build directory
|
||||||
rm -rf $TARGET_DIRECTORY
|
rm -rf $TARGET_DIRECTORY
|
||||||
mkdir "${TARGET_DIRECTORY}"
|
mkdir "${TARGET_DIRECTORY}"
|
||||||
|
@ -169,10 +169,7 @@ if [[ ! -z "$PKG_SIGN_NAME" ]]; then
|
||||||
${PKGNAME}
|
${PKGNAME}
|
||||||
|
|
||||||
# notarize the package
|
# notarize the package
|
||||||
if [[ ! -z "$CFD_NOTE_PASSWORD" ]]; then
|
# TODO: https://jira.cfdata.org/browse/TUN-5789
|
||||||
xcrun altool --notarize-app -f ${PKGNAME} -t osx -u ${CFD_NOTE_USERNAME} -p ${CFD_NOTE_PASSWORD} --primary-bundle-id ${BUNDLE_ID}
|
|
||||||
xcrun stapler staple ${PKGNAME}
|
|
||||||
fi
|
|
||||||
else
|
else
|
||||||
pkgbuild --identifier com.cloudflare.${PRODUCT} \
|
pkgbuild --identifier com.cloudflare.${PRODUCT} \
|
||||||
--version ${VERSION} \
|
--version ${VERSION} \
|
||||||
|
|
|
@ -3,7 +3,6 @@
|
||||||
set -euo pipefail
|
set -euo pipefail
|
||||||
|
|
||||||
FILENAME="${PWD}/artifacts/cloudflared-darwin-amd64.tgz"
|
FILENAME="${PWD}/artifacts/cloudflared-darwin-amd64.tgz"
|
||||||
|
|
||||||
if ! VERSION="$(git describe --tags --exact-match 2>/dev/null)" ; then
|
if ! VERSION="$(git describe --tags --exact-match 2>/dev/null)" ; then
|
||||||
echo "Skipping public release for an untagged commit."
|
echo "Skipping public release for an untagged commit."
|
||||||
echo "##teamcity[buildStatus status='SUCCESS' text='Skipped due to lack of tag']"
|
echo "##teamcity[buildStatus status='SUCCESS' text='Skipped due to lack of tag']"
|
||||||
|
@ -15,24 +14,24 @@ if [[ ! -f "$FILENAME" ]] ; then
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if [[ "${GITHUB_PRIVATE_KEY:-}" == "" ]] ; then
|
if [[ "${GITHUB_PRIVATE_KEY_B64:-}" == "" ]] ; then
|
||||||
echo "Missing GITHUB_PRIVATE_KEY"
|
echo "Missing GITHUB_PRIVATE_KEY_B64"
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# upload to s3 bucket for use by Homebrew formula
|
# upload to s3 bucket for use by Homebrew formula
|
||||||
s3cmd \
|
s3cmd \
|
||||||
--acl-public --signature-v2 --access_key="$AWS_ACCESS_KEY_ID" --secret_key="$AWS_SECRET_ACCESS_KEY" --host-bucket="%(bucket)s.s3.cfdata.org" \
|
--acl-public --access_key="$AWS_ACCESS_KEY_ID" --secret_key="$AWS_SECRET_ACCESS_KEY" --host-bucket="%(bucket)s.s3.cfdata.org" \
|
||||||
put "$FILENAME" "s3://cftunnel-docs/dl/cloudflared-$VERSION-darwin-amd64.tgz"
|
put "$FILENAME" "s3://cftunnel-docs/dl/cloudflared-$VERSION-darwin-amd64.tgz"
|
||||||
s3cmd \
|
s3cmd \
|
||||||
--acl-public --signature-v2 --access_key="$AWS_ACCESS_KEY_ID" --secret_key="$AWS_SECRET_ACCESS_KEY" --host-bucket="%(bucket)s.s3.cfdata.org" \
|
--acl-public --access_key="$AWS_ACCESS_KEY_ID" --secret_key="$AWS_SECRET_ACCESS_KEY" --host-bucket="%(bucket)s.s3.cfdata.org" \
|
||||||
cp "s3://cftunnel-docs/dl/cloudflared-$VERSION-darwin-amd64.tgz" "s3://cftunnel-docs/dl/cloudflared-stable-darwin-amd64.tgz"
|
cp "s3://cftunnel-docs/dl/cloudflared-$VERSION-darwin-amd64.tgz" "s3://cftunnel-docs/dl/cloudflared-stable-darwin-amd64.tgz"
|
||||||
SHA256=$(sha256sum "$FILENAME" | cut -b1-64)
|
SHA256=$(sha256sum "$FILENAME" | cut -b1-64)
|
||||||
|
|
||||||
# set up git (note that UserKnownHostsFile is an absolute path so we can cd wherever)
|
# set up git (note that UserKnownHostsFile is an absolute path so we can cd wherever)
|
||||||
mkdir -p tmp
|
mkdir -p tmp
|
||||||
ssh-keyscan -t rsa github.com > tmp/github.txt
|
ssh-keyscan -t rsa github.com > tmp/github.txt
|
||||||
echo "$GITHUB_PRIVATE_KEY" > tmp/private.key
|
echo "$GITHUB_PRIVATE_KEY_B64" | base64 --decode > tmp/private.key
|
||||||
chmod 0400 tmp/private.key
|
chmod 0400 tmp/private.key
|
||||||
export GIT_SSH_COMMAND="ssh -o UserKnownHostsFile=$PWD/tmp/github.txt -i $PWD/tmp/private.key -o IdentitiesOnly=yes"
|
export GIT_SSH_COMMAND="ssh -o UserKnownHostsFile=$PWD/tmp/github.txt -i $PWD/tmp/private.key -o IdentitiesOnly=yes"
|
||||||
|
|
||||||
|
|
35
CHANGES.md
35
CHANGES.md
|
@ -1,3 +1,38 @@
|
||||||
|
## 2023.4.1
|
||||||
|
### New Features
|
||||||
|
- You can now stream your logs from your remote cloudflared to your local terminal with `cloudflared tail <TUNNEL-ID>`. This new feature requires the remote cloudflared to be version 2023.4.1 or higher.
|
||||||
|
|
||||||
|
## 2023.3.2
|
||||||
|
### Notices
|
||||||
|
- Due to the nature of QuickTunnels (https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/do-more-with-tunnels/trycloudflare/) and its intended usage for testing and experiment of Cloudflare Tunnels, starting from 2023.3.2, QuickTunnels only make a single connection to the edge. If users want to use Tunnels in a production environment, they should move to Named Tunnels instead. (https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/install-and-setup/tunnel-guide/remote/#set-up-a-tunnel-remotely-dashboard-setup)
|
||||||
|
|
||||||
|
## 2023.3.1
|
||||||
|
### Breaking Change
|
||||||
|
- Running a tunnel without ingress rules defined in configuration file nor from the CLI flags will no longer provide a default ingress rule to localhost:8080 and instead will return HTTP response code 503 for all incoming HTTP requests.
|
||||||
|
|
||||||
|
### Security Fixes
|
||||||
|
- Windows 32 bit machines MSI now defaults to Program Files to install cloudflared. (See CVE-2023-1314). The cloudflared client itself is unaffected. This just changes how the installer works on 32 bit windows machines.
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
- Fixed a bug that would cause running tunnel on Bastion mode and without ingress rules to crash.
|
||||||
|
|
||||||
|
## 2023.2.2
|
||||||
|
### Notices
|
||||||
|
- Legacy tunnels were officially deprecated on December 1, 2022. Starting with this version, cloudflared no longer supports connecting legacy tunnels.
|
||||||
|
- h2mux tunnel connection protocol is no longer supported. Any tunnels still configured to use this protocol will alert and use http2 tunnel protocol instead. We recommend using quic protocol for all tunnels going forward.
|
||||||
|
|
||||||
|
## 2023.2.1
|
||||||
|
### Bug fixes
|
||||||
|
- Fixed a bug in TCP connection proxy that could result in the connection being closed before all data was written.
|
||||||
|
- cloudflared now correctly aborts body write if connection to origin service fails after response headers were sent already.
|
||||||
|
- Fixed a bug introduced in the previous release where debug endpoints were removed.
|
||||||
|
|
||||||
|
## 2022.12.0
|
||||||
|
### Improvements
|
||||||
|
- cloudflared now attempts to try other edge addresses before falling back to a lower protocol.
|
||||||
|
- cloudflared tunnel no longer spins up a quick tunnel. The call has to be explicit and provide a --url flag.
|
||||||
|
- cloudflared will now randomly pick the first or second region to connect to instead of always connecting to region2 first.
|
||||||
|
|
||||||
## 2022.9.0
|
## 2022.9.0
|
||||||
### New Features
|
### New Features
|
||||||
- cloudflared now rejects ingress rules with invalid http status codes for http_status.
|
- cloudflared now rejects ingress rules with invalid http status codes for http_status.
|
||||||
|
|
9
Makefile
9
Makefile
|
@ -82,6 +82,8 @@ else ifeq ($(LOCAL_OS),windows)
|
||||||
TARGET_OS ?= windows
|
TARGET_OS ?= windows
|
||||||
else ifeq ($(LOCAL_OS),freebsd)
|
else ifeq ($(LOCAL_OS),freebsd)
|
||||||
TARGET_OS ?= freebsd
|
TARGET_OS ?= freebsd
|
||||||
|
else ifeq ($(LOCAL_OS),openbsd)
|
||||||
|
TARGET_OS ?= openbsd
|
||||||
else
|
else
|
||||||
$(error This system's OS $(LOCAL_OS) isn't supported)
|
$(error This system's OS $(LOCAL_OS) isn't supported)
|
||||||
endif
|
endif
|
||||||
|
@ -108,6 +110,9 @@ else
|
||||||
PACKAGE_ARCH := $(TARGET_ARCH)
|
PACKAGE_ARCH := $(TARGET_ARCH)
|
||||||
endif
|
endif
|
||||||
|
|
||||||
|
#for FIPS compliance, FPM defaults to MD5.
|
||||||
|
RPM_DIGEST := --rpm-digest sha256
|
||||||
|
|
||||||
.PHONY: all
|
.PHONY: all
|
||||||
all: cloudflared test
|
all: cloudflared test
|
||||||
|
|
||||||
|
@ -163,13 +168,13 @@ define build_package
|
||||||
mkdir -p $(PACKAGE_DIR)
|
mkdir -p $(PACKAGE_DIR)
|
||||||
cp cloudflared $(PACKAGE_DIR)/cloudflared
|
cp cloudflared $(PACKAGE_DIR)/cloudflared
|
||||||
cp cloudflared.1 $(PACKAGE_DIR)/cloudflared.1
|
cp cloudflared.1 $(PACKAGE_DIR)/cloudflared.1
|
||||||
fakeroot fpm -C $(PACKAGE_DIR) -s dir -t $(1) \
|
fpm -C $(PACKAGE_DIR) -s dir -t $(1) \
|
||||||
--description 'Cloudflare Tunnel daemon' \
|
--description 'Cloudflare Tunnel daemon' \
|
||||||
--vendor 'Cloudflare' \
|
--vendor 'Cloudflare' \
|
||||||
--license 'Apache License Version 2.0' \
|
--license 'Apache License Version 2.0' \
|
||||||
--url 'https://github.com/cloudflare/cloudflared' \
|
--url 'https://github.com/cloudflare/cloudflared' \
|
||||||
-m 'Cloudflare <support@cloudflare.com>' \
|
-m 'Cloudflare <support@cloudflare.com>' \
|
||||||
-a $(PACKAGE_ARCH) -v $(VERSION) -n $(DEB_PACKAGE_NAME) $(NIGHTLY_FLAGS) --after-install postinst.sh --after-remove postrm.sh \
|
-a $(PACKAGE_ARCH) -v $(VERSION) -n $(DEB_PACKAGE_NAME) $(RPM_DIGEST) $(NIGHTLY_FLAGS) --after-install postinst.sh --after-remove postrm.sh \
|
||||||
cloudflared=$(INSTALL_BINDIR) cloudflared.1=$(INSTALL_MANDIR)
|
cloudflared=$(INSTALL_BINDIR) cloudflared.1=$(INSTALL_MANDIR)
|
||||||
endef
|
endef
|
||||||
|
|
||||||
|
|
113
RELEASE_NOTES
113
RELEASE_NOTES
|
@ -1,3 +1,116 @@
|
||||||
|
2023.4.2
|
||||||
|
- 2023-04-24 TUN-7133: Add sampling support for streaming logs
|
||||||
|
- 2023-04-21 TUN-7141: Add component tests for streaming logs
|
||||||
|
- 2023-04-21 TUN-7373: Streaming logs override for same actor
|
||||||
|
- 2023-04-20 TUN-7383: Bump requirements.txt
|
||||||
|
- 2023-04-19 TUN-7361: Add a label to override hostname
|
||||||
|
- 2023-04-19 TUN-7378: Remove RPC debug logs
|
||||||
|
- 2023-04-18 TUN-7360: Add Get Host Details handler in management service
|
||||||
|
- 2023-04-17 AUTH-3122 Verify that Access tokens are still valid in curl command
|
||||||
|
- 2023-04-17 TUN-7129: Categorize TCP logs for streaming logs
|
||||||
|
- 2023-04-17 TUN-7130: Categorize UDP logs for streaming logs
|
||||||
|
- 2023-04-10 AUTH-4887 Add aud parameter to token transfer url
|
||||||
|
|
||||||
|
2023.4.1
|
||||||
|
- 2023-04-13 TUN-7368: Report destination address for TCP requests in logs
|
||||||
|
- 2023-04-12 TUN-7134: Acquire token for cloudflared tail
|
||||||
|
- 2023-04-12 TUN-7131: Add cloudflared log event to connection messages and enable streaming logs
|
||||||
|
- 2023-04-11 TUN-7132 TUN-7136: Add filter support for streaming logs
|
||||||
|
- 2023-04-06 TUN-7354: Don't warn for empty ingress rules when using --token
|
||||||
|
- 2023-04-06 TUN-7128: Categorize logs from public hostname locations
|
||||||
|
- 2023-04-06 TUN-7351: Add streaming logs session ping and timeout
|
||||||
|
- 2023-04-06 TUN-7335: Fix cloudflared update not working in windows
|
||||||
|
|
||||||
|
2023.4.0
|
||||||
|
- 2023-04-07 TUN-7356: Bump golang.org/x/net package to 0.7.0
|
||||||
|
- 2023-04-07 TUN-7357: Bump to go 1.19.6
|
||||||
|
- 2023-04-06 TUN-7127: Disconnect logger level requirement for management
|
||||||
|
- 2023-04-05 TUN-7332: Remove legacy tunnel force flag
|
||||||
|
- 2023-04-05 TUN-7135: Add cloudflared tail
|
||||||
|
- 2023-04-04 Add suport for OpenBSD (#916)
|
||||||
|
- 2023-04-04 Fix typo (#918)
|
||||||
|
- 2023-04-04 TUN-7125: Add management streaming logs WebSocket protocol
|
||||||
|
- 2023-03-30 TUN-9999: Remove classic tunnel component tests
|
||||||
|
- 2023-03-30 TUN-7126: Add Management logger io.Writer
|
||||||
|
- 2023-03-29 TUN-7324: Add http.Hijacker to connection.ResponseWriter
|
||||||
|
- 2023-03-29 TUN-7333: Default features checkable at runtime across all packages
|
||||||
|
- 2023-03-21 TUN-7124: Add intercept ingress rule for management requests
|
||||||
|
|
||||||
|
2023.3.1
|
||||||
|
- 2023-03-13 TUN-7271: Return 503 status code when no ingress rules configured
|
||||||
|
- 2023-03-10 TUN-7272: Fix cloudflared returning non supported status service which breaks configuration migration
|
||||||
|
- 2023-03-09 TUN-7259: Add warning for missing ingress rules
|
||||||
|
- 2023-03-09 TUN-7268: Default to Program Files as location for win32
|
||||||
|
- 2023-03-07 TUN-7252: Remove h2mux connection
|
||||||
|
- 2023-03-07 TUN-7253: Adopt http.ResponseWriter for connection.ResponseWriter
|
||||||
|
- 2023-03-06 TUN-7245: Add bastion flag to origin service check
|
||||||
|
- 2023-03-06 EDGESTORE-108: Remove deprecated s3v2 signature
|
||||||
|
- 2023-03-02 TUN-7226: Fixed a missed rename
|
||||||
|
|
||||||
|
2023.3.0
|
||||||
|
- 2023-03-01 GH-352: Add Tunnel CLI option "edge-bind-address" (#870)
|
||||||
|
- 2023-03-01 Fixed WIX template to allow MSI upgrades (#838)
|
||||||
|
- 2023-02-28 TUN-7213: Decode Base64 encoded key before writing it
|
||||||
|
- 2023-02-28 check.yaml: update actions to v3 (#876)
|
||||||
|
- 2023-02-27 TUN-7213: Debug homebrew-cloudflare build
|
||||||
|
- 2023-02-15 RTG-2476 Add qtls override for Go 1.20
|
||||||
|
|
||||||
|
2023.2.2
|
||||||
|
- 2023-02-22 TUN-7197: Add connIndex tag to debug messages of incoming requests
|
||||||
|
- 2023-02-08 TUN-7167: Respect protocol overrides with --token
|
||||||
|
- 2023-02-06 TUN-7065: Remove classic tunnel creation
|
||||||
|
- 2023-02-06 TUN-6938: Force h2mux protocol to http2 for named tunnels
|
||||||
|
- 2023-02-06 TUN-6938: Provide QUIC as first in protocol list
|
||||||
|
- 2023-02-03 TUN-7158: Correct TCP tracing propagation
|
||||||
|
- 2023-02-01 TUN-7151: Update changes file with latest release notices
|
||||||
|
|
||||||
|
2023.2.1
|
||||||
|
- 2023-02-01 TUN-7065: Revert Ingress Rule check for named tunnel configurations
|
||||||
|
- 2023-02-01 Revert "TUN-7065: Revert Ingress Rule check for named tunnel configurations"
|
||||||
|
- 2023-02-01 Revert "TUN-7065: Remove classic tunnel creation"
|
||||||
|
2023.1.0
|
||||||
|
- 2023-01-10 TUN-7064: RPM digests are now sha256 instead of md5sum
|
||||||
|
- 2023-01-04 RTG-2418 Update qtls
|
||||||
|
- 2022-12-24 TUN-7057: Remove dependency github.com/gorilla/mux
|
||||||
|
- 2022-12-24 TUN-6724: Migrate to sentry-go from raven-go
|
||||||
|
|
||||||
|
2022.12.1
|
||||||
|
- 2022-12-20 TUN-7021: Fix proxy-dns not starting when cloudflared tunnel is run
|
||||||
|
- 2022-12-15 TUN-7010: Changelog for release 2022.12.0
|
||||||
|
|
||||||
|
2022.12.0
|
||||||
|
- 2022-12-14 TUN-6999: cloudflared should attempt other edge addresses before falling back on protocol
|
||||||
|
- 2022-12-13 TUN-7004: Dont show local config dirs for remotely configured tuns
|
||||||
|
- 2022-12-12 TUN-7003: Tempoarily disable erroneous notarize-app
|
||||||
|
- 2022-12-12 TUN-7003: Add back a missing fi
|
||||||
|
- 2022-12-07 TUN-7000: Reduce metric cardinality of closedConnections metric by removing error as tag
|
||||||
|
- 2022-12-07 TUN-6994: Improve logging config file not found
|
||||||
|
- 2022-12-07 TUN-7002: Randomise first region selection
|
||||||
|
- 2022-12-07 TUN-6995: Disable quick-tunnels spin up by default
|
||||||
|
- 2022-12-05 TUN-6984: Add bash set x to improve visibility during builds
|
||||||
|
- 2022-12-05 TUN-6984: [CI] Ignore security import errors for code_sigining
|
||||||
|
- 2022-12-05 TUN-6984: [CI] Don't fail on unset.
|
||||||
|
- 2022-11-30 TUN-6984: Set euo pipefile for homebrew builds
|
||||||
|
|
||||||
|
2022.11.1
|
||||||
|
- 2022-11-29 TUN-6981: We should close UDP socket if failed to connecto to edge
|
||||||
|
- 2022-11-25 CUSTESC-23757: Fix a bug where a wildcard ingress rule would match an host without starting with a dot
|
||||||
|
- 2022-11-24 TUN-6970: Print newline when printing tunnel token
|
||||||
|
- 2022-11-22 TUN-6963: Refactor Metrics service setup
|
||||||
|
2022.11.0
|
||||||
|
- 2022-11-16 Revert "TUN-6935: Cloudflared should use APIToken instead of serviceKey"
|
||||||
|
- 2022-11-16 TUN-6929: Use same protocol for other connections as first one
|
||||||
|
- 2022-11-14 TUN-6941: Reduce log level to debug when failing to proxy ICMP reply
|
||||||
|
- 2022-11-14 TUN-6935: Cloudflared should use APIToken instead of serviceKey
|
||||||
|
- 2022-11-14 TUN-6935: Cloudflared should use APIToken instead of serviceKey
|
||||||
|
- 2022-11-11 TUN-6937: Bump golang.org/x/* packages to new release tags
|
||||||
|
- 2022-11-10 ZTC-234: macOS tests
|
||||||
|
- 2022-11-09 TUN-6927: Refactor validate access configuration to allow empty audTags only
|
||||||
|
- 2022-11-08 ZTC-234: Replace ICMP funnels when ingress connection changes
|
||||||
|
- 2022-11-04 TUN-6917: Bump go to 1.19.3
|
||||||
|
- 2022-11-02 Issue #574: Better ssh config for short-lived cert (#763)
|
||||||
|
- 2022-10-28 TUN-6898: Fix bug handling IPv6 based ingresses with missing port
|
||||||
|
- 2022-10-28 TUN-6898: Refactor addPortIfMissing
|
||||||
2022.10.3
|
2022.10.3
|
||||||
- 2022-10-24 TUN-6871: Add default feature to cloudflared to support EOF on QUIC connections
|
- 2022-10-24 TUN-6871: Add default feature to cloudflared to support EOF on QUIC connections
|
||||||
- 2022-10-19 TUN-6876: Fix flaky TestTraceICMPRouterEcho by taking account request span can return before reply
|
- 2022-10-19 TUN-6876: Fix flaky TestTraceICMPRouterEcho by taking account request span can return before reply
|
||||||
|
|
|
@ -9,6 +9,7 @@ import (
|
||||||
"github.com/gorilla/websocket"
|
"github.com/gorilla/websocket"
|
||||||
"github.com/rs/zerolog"
|
"github.com/rs/zerolog"
|
||||||
|
|
||||||
|
"github.com/cloudflare/cloudflared/stream"
|
||||||
"github.com/cloudflare/cloudflared/token"
|
"github.com/cloudflare/cloudflared/token"
|
||||||
cfwebsocket "github.com/cloudflare/cloudflared/websocket"
|
cfwebsocket "github.com/cloudflare/cloudflared/websocket"
|
||||||
)
|
)
|
||||||
|
@ -37,7 +38,7 @@ func (ws *Websocket) ServeStream(options *StartOptions, conn io.ReadWriter) erro
|
||||||
}
|
}
|
||||||
defer wsConn.Close()
|
defer wsConn.Close()
|
||||||
|
|
||||||
cfwebsocket.Stream(wsConn, conn, ws.log)
|
stream.Pipe(wsConn, conn, ws.log)
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -1,94 +0,0 @@
|
||||||
package certutil
|
|
||||||
|
|
||||||
import (
|
|
||||||
"crypto/x509"
|
|
||||||
"encoding/json"
|
|
||||||
"encoding/pem"
|
|
||||||
"fmt"
|
|
||||||
"strings"
|
|
||||||
)
|
|
||||||
|
|
||||||
type namedTunnelToken struct {
|
|
||||||
ZoneID string `json:"zoneID"`
|
|
||||||
AccountID string `json:"accountID"`
|
|
||||||
ServiceKey string `json:"serviceKey"`
|
|
||||||
}
|
|
||||||
|
|
||||||
type OriginCert struct {
|
|
||||||
PrivateKey interface{}
|
|
||||||
Cert *x509.Certificate
|
|
||||||
ZoneID string
|
|
||||||
ServiceKey string
|
|
||||||
AccountID string
|
|
||||||
}
|
|
||||||
|
|
||||||
func DecodeOriginCert(blocks []byte) (*OriginCert, error) {
|
|
||||||
if len(blocks) == 0 {
|
|
||||||
return nil, fmt.Errorf("Cannot decode empty certificate")
|
|
||||||
}
|
|
||||||
originCert := OriginCert{}
|
|
||||||
block, rest := pem.Decode(blocks)
|
|
||||||
for {
|
|
||||||
if block == nil {
|
|
||||||
break
|
|
||||||
}
|
|
||||||
switch block.Type {
|
|
||||||
case "PRIVATE KEY":
|
|
||||||
if originCert.PrivateKey != nil {
|
|
||||||
return nil, fmt.Errorf("Found multiple private key in the certificate")
|
|
||||||
}
|
|
||||||
// RSA private key
|
|
||||||
privateKey, err := x509.ParsePKCS8PrivateKey(block.Bytes)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("Cannot parse private key")
|
|
||||||
}
|
|
||||||
originCert.PrivateKey = privateKey
|
|
||||||
case "CERTIFICATE":
|
|
||||||
if originCert.Cert != nil {
|
|
||||||
return nil, fmt.Errorf("Found multiple certificates in the certificate")
|
|
||||||
}
|
|
||||||
cert, err := x509.ParseCertificates(block.Bytes)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("Cannot parse certificate")
|
|
||||||
} else if len(cert) > 1 {
|
|
||||||
return nil, fmt.Errorf("Found multiple certificates in the certificate")
|
|
||||||
}
|
|
||||||
originCert.Cert = cert[0]
|
|
||||||
case "WARP TOKEN", "ARGO TUNNEL TOKEN":
|
|
||||||
if originCert.ZoneID != "" || originCert.ServiceKey != "" {
|
|
||||||
return nil, fmt.Errorf("Found multiple tokens in the certificate")
|
|
||||||
}
|
|
||||||
// The token is a string,
|
|
||||||
// Try the newer JSON format
|
|
||||||
ntt := namedTunnelToken{}
|
|
||||||
if err := json.Unmarshal(block.Bytes, &ntt); err == nil {
|
|
||||||
originCert.ZoneID = ntt.ZoneID
|
|
||||||
originCert.ServiceKey = ntt.ServiceKey
|
|
||||||
originCert.AccountID = ntt.AccountID
|
|
||||||
} else {
|
|
||||||
// Try the older format, where the zoneID and service key are separated by
|
|
||||||
// a new line character
|
|
||||||
token := string(block.Bytes)
|
|
||||||
s := strings.Split(token, "\n")
|
|
||||||
if len(s) != 2 {
|
|
||||||
return nil, fmt.Errorf("Cannot parse token")
|
|
||||||
}
|
|
||||||
originCert.ZoneID = s[0]
|
|
||||||
originCert.ServiceKey = s[1]
|
|
||||||
}
|
|
||||||
default:
|
|
||||||
return nil, fmt.Errorf("Unknown block %s in the certificate", block.Type)
|
|
||||||
}
|
|
||||||
block, rest = pem.Decode(rest)
|
|
||||||
}
|
|
||||||
|
|
||||||
if originCert.PrivateKey == nil {
|
|
||||||
return nil, fmt.Errorf("Missing private key in the certificate")
|
|
||||||
} else if originCert.Cert == nil {
|
|
||||||
return nil, fmt.Errorf("Missing certificate in the certificate")
|
|
||||||
} else if originCert.ZoneID == "" || originCert.ServiceKey == "" {
|
|
||||||
return nil, fmt.Errorf("Missing token in the certificate")
|
|
||||||
}
|
|
||||||
|
|
||||||
return &originCert, nil
|
|
||||||
}
|
|
|
@ -1,67 +0,0 @@
|
||||||
package certutil
|
|
||||||
|
|
||||||
import (
|
|
||||||
"fmt"
|
|
||||||
"io/ioutil"
|
|
||||||
"testing"
|
|
||||||
|
|
||||||
"github.com/stretchr/testify/assert"
|
|
||||||
)
|
|
||||||
|
|
||||||
func TestLoadOriginCert(t *testing.T) {
|
|
||||||
cert, err := DecodeOriginCert([]byte{})
|
|
||||||
assert.Equal(t, fmt.Errorf("Cannot decode empty certificate"), err)
|
|
||||||
assert.Nil(t, cert)
|
|
||||||
|
|
||||||
blocks, err := ioutil.ReadFile("test-cert-no-key.pem")
|
|
||||||
assert.Nil(t, err)
|
|
||||||
cert, err = DecodeOriginCert(blocks)
|
|
||||||
assert.Equal(t, fmt.Errorf("Missing private key in the certificate"), err)
|
|
||||||
assert.Nil(t, cert)
|
|
||||||
|
|
||||||
blocks, err = ioutil.ReadFile("test-cert-two-certificates.pem")
|
|
||||||
assert.Nil(t, err)
|
|
||||||
cert, err = DecodeOriginCert(blocks)
|
|
||||||
assert.Equal(t, fmt.Errorf("Found multiple certificates in the certificate"), err)
|
|
||||||
assert.Nil(t, cert)
|
|
||||||
|
|
||||||
blocks, err = ioutil.ReadFile("test-cert-unknown-block.pem")
|
|
||||||
assert.Nil(t, err)
|
|
||||||
cert, err = DecodeOriginCert(blocks)
|
|
||||||
assert.Equal(t, fmt.Errorf("Unknown block RSA PRIVATE KEY in the certificate"), err)
|
|
||||||
assert.Nil(t, cert)
|
|
||||||
|
|
||||||
blocks, err = ioutil.ReadFile("test-cert.pem")
|
|
||||||
assert.Nil(t, err)
|
|
||||||
cert, err = DecodeOriginCert(blocks)
|
|
||||||
assert.Nil(t, err)
|
|
||||||
assert.NotNil(t, cert)
|
|
||||||
assert.Equal(t, "7b0a4d77dfb881c1a3b7d61ea9443e19", cert.ZoneID)
|
|
||||||
key := "v1.0-58bd4f9e28f7b3c28e05a35ff3e80ab4fd9644ef3fece537eb0d12e2e9258217-183442fbb0bbdb3e571558fec9b5589ebd77aafc87498ee3f09f64a4ad79ffe8791edbae08b36c1d8f1d70a8670de56922dff92b15d214a524f4ebfa1958859e-7ce80f79921312a6022c5d25e2d380f82ceaefe3fbdc43dd13b080e3ef1e26f7"
|
|
||||||
assert.Equal(t, key, cert.ServiceKey)
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestNewlineArgoTunnelToken(t *testing.T) {
|
|
||||||
ArgoTunnelTokenTest(t, "test-argo-tunnel-cert.pem")
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestJSONArgoTunnelToken(t *testing.T) {
|
|
||||||
// The given cert's Argo Tunnel Token was generated by base64 encoding this JSON:
|
|
||||||
// {
|
|
||||||
// "zoneID": "7b0a4d77dfb881c1a3b7d61ea9443e19",
|
|
||||||
// "serviceKey": "test-service-key",
|
|
||||||
// "accountID": "abcdabcdabcdabcd1234567890abcdef"
|
|
||||||
// }
|
|
||||||
ArgoTunnelTokenTest(t, "test-argo-tunnel-cert-json.pem")
|
|
||||||
}
|
|
||||||
|
|
||||||
func ArgoTunnelTokenTest(t *testing.T, path string) {
|
|
||||||
blocks, err := ioutil.ReadFile(path)
|
|
||||||
assert.Nil(t, err)
|
|
||||||
cert, err := DecodeOriginCert(blocks)
|
|
||||||
assert.Nil(t, err)
|
|
||||||
assert.NotNil(t, cert)
|
|
||||||
assert.Equal(t, "7b0a4d77dfb881c1a3b7d61ea9443e19", cert.ZoneID)
|
|
||||||
key := "test-service-key"
|
|
||||||
assert.Equal(t, key, cert.ServiceKey)
|
|
||||||
}
|
|
|
@ -1,33 +0,0 @@
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIID+jCCA6CgAwIBAgIUJhFxUKEGvTRc3CjCok6dbPGH/P4wCgYIKoZIzj0EAwIw
|
|
||||||
gagxCzAJBgNVBAYTAlVTMRkwFwYDVQQKExBDbG91ZEZsYXJlLCBJbmMuMTgwNgYD
|
|
||||||
VQQLEy9DbG91ZEZsYXJlIE9yaWdpbiBTU0wgRUNDIENlcnRpZmljYXRlIEF1dGhv
|
|
||||||
cml0eTEWMBQGA1UEBxMNU2FuIEZyYW5jaXNjbzETMBEGA1UECBMKQ2FsaWZvcm5p
|
|
||||||
YTEXMBUGA1UEAxMOKGRldiB1c2Ugb25seSkwHhcNMTcxMDEzMTM1OTAwWhcNMzIx
|
|
||||||
MDA5MTM1OTAwWjBiMRkwFwYDVQQKExBDbG91ZEZsYXJlLCBJbmMuMR0wGwYDVQQL
|
|
||||||
ExRDbG91ZEZsYXJlIE9yaWdpbiBDQTEmMCQGA1UEAxMdQ2xvdWRGbGFyZSBPcmln
|
|
||||||
aW4gQ2VydGlmaWNhdGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCf
|
|
||||||
GswL16Fz9Ei3sAg5AmBizoN2nZdyXHP8T57UxUMcrlJXEEXCVS5RR4m9l+EmK0ng
|
|
||||||
6yHR1H5oX1Lg1WKyXgWwr0whwmdTD+qWFJW2M8HyefyBKLrsGPuxw4CVYT0h72bx
|
|
||||||
tG0uyrXYh7Mtz0lHjGV90qrFpq5o0jx0sLbDlDvpFPbIO58uYzKG4Sn2VTC4rOyX
|
|
||||||
PE6SuDvMHIeX6Ekw4wSVQ9eTbksLQqTyxSqM3zp2ygc56SjGjy1nGQT8ZBGFzSbZ
|
|
||||||
AzNOxVKrUsySx7LzZVl+zCGCPlQwaYLKObKXadZJmrqSFmErC5jcbVgBz7oJQOgl
|
|
||||||
HJ2n0sMcZ+Ja1Y649mPVAgMBAAGjggEgMIIBHDAOBgNVHQ8BAf8EBAMCBaAwEwYD
|
|
||||||
VR0lBAwwCgYIKwYBBQUHAwEwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUzA6f2Ajq
|
|
||||||
zhX67c6piY2a1uTiUkwwHwYDVR0jBBgwFoAU2qfBlqxKMZnf0QeTeYiMelfqJfgw
|
|
||||||
RAYIKwYBBQUHAQEEODA2MDQGCCsGAQUFBzABhihodHRwOi8vb2NzcC5jbG91ZGZs
|
|
||||||
YXJlLmNvbS9vcmlnaW5fZWNjX2NhMCMGA1UdEQQcMBqCDCouYXJub2xkLmNvbYIK
|
|
||||||
YXJub2xkLmNvbTA8BgNVHR8ENTAzMDGgL6AthitodHRwOi8vY3JsLmNsb3VkZmxh
|
|
||||||
cmUuY29tL29yaWdpbl9lY2NfY2EuY3JsMAoGCCqGSM49BAMCA0gAMEUCIDV7HoMj
|
|
||||||
K5rShE/l+90YAOzHC89OH/wUz3I5KYOFuehoAiEA8e92aIf9XBkr0K6EvFCiSsD+
|
|
||||||
x+Yo/cL8fGfVpPt4UM8=
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
-----BEGIN WARP TOKEN-----
|
|
||||||
N2IwYTRkNzdkZmI4ODFjMWEzYjdkNjFlYTk0NDNlMTkKdjEuMC01OGJkNGY5ZTI4
|
|
||||||
ZjdiM2MyOGUwNWEzNWZmM2U4MGFiNGZkOTY0NGVmM2ZlY2U1MzdlYjBkMTJlMmU5
|
|
||||||
MjU4MjE3LTE4MzQ0MmZiYjBiYmRiM2U1NzE1NThmZWM5YjU1ODllYmQ3N2FhZmM4
|
|
||||||
NzQ5OGVlM2YwOWY2NGE0YWQ3OWZmZTg3OTFlZGJhZTA4YjM2YzFkOGYxZDcwYTg2
|
|
||||||
NzBkZTU2OTIyZGZmOTJiMTVkMjE0YTUyNGY0ZWJmYTE5NTg4NTllLTdjZTgwZjc5
|
|
||||||
OTIxMzEyYTYwMjJjNWQyNWUyZDM4MGY4MmNlYWVmZTNmYmRjNDNkZDEzYjA4MGUz
|
|
||||||
ZWYxZTI2Zjc=
|
|
||||||
-----END WARP TOKEN-----
|
|
|
@ -1,85 +0,0 @@
|
||||||
-----BEGIN PRIVATE KEY-----
|
|
||||||
MIIEvwIBADANBgkqhkiG9w0BAQEFAASCBKkwggSlAgEAAoIBAQCfGswL16Fz9Ei3
|
|
||||||
sAg5AmBizoN2nZdyXHP8T57UxUMcrlJXEEXCVS5RR4m9l+EmK0ng6yHR1H5oX1Lg
|
|
||||||
1WKyXgWwr0whwmdTD+qWFJW2M8HyefyBKLrsGPuxw4CVYT0h72bxtG0uyrXYh7Mt
|
|
||||||
z0lHjGV90qrFpq5o0jx0sLbDlDvpFPbIO58uYzKG4Sn2VTC4rOyXPE6SuDvMHIeX
|
|
||||||
6Ekw4wSVQ9eTbksLQqTyxSqM3zp2ygc56SjGjy1nGQT8ZBGFzSbZAzNOxVKrUsyS
|
|
||||||
x7LzZVl+zCGCPlQwaYLKObKXadZJmrqSFmErC5jcbVgBz7oJQOglHJ2n0sMcZ+Ja
|
|
||||||
1Y649mPVAgMBAAECggEAEbPF0ah9fH0IzTU/CPbIeh3flyY8GDuMpR1HvwUurSWB
|
|
||||||
IFI9bLyVAXKb8vYP1TMaTnXi5qmFof+/JShgyZc3+1tZtWTfoaiC8Y1bRfE2yk+D
|
|
||||||
xmwddhDmijYGG7i8uEaeddSdFEh2GKAqkbV/QgBvN2Nl4EVmIOAJXXNe9l5LFyjy
|
|
||||||
sR10aNVJRYV1FahrCTwZ3SovHP4d4AUvHh/3FFZDukHc37CFA0+CcR4uehp5yedi
|
|
||||||
2UdqaszXqunFo/3h+Tn9dW2C7gTTZx4+mfyaws3p3YOmdYArXvpejxHIc0FGwLBm
|
|
||||||
sb9K7wGVUiF0Bt0ch+C1mdYrCaFNHnPuDswjmm3FwQKBgQDYtxOwwSLA6ZyppozX
|
|
||||||
Doyx9a7PhiMHCFKSdVB4l8rpK545a+AmpG6LRScTtBsMTHBhT3IQ3QPWlVm1AhjF
|
|
||||||
AvXMa1rOeaGbCbDn1xqEoEVPtj4tys8eTfyWmtU73jWTFauOt4/xpf/urEpg91xj
|
|
||||||
m+Gl/8qgBrpm5rQxV5Y4MysRlQKBgQC78jzzlhocXGNvw0wT/K2NsknyeoZXqpIE
|
|
||||||
QYL60FMl4geZn6w9hwxaL1r+g/tUjTnpBPQtS1r2Ed2gXby5zspN1g/PW8U3t3to
|
|
||||||
P7zHIJ/sLBXrCh5RJko3hUgGhDNOOCIQj4IaKUfvHYvEIbIxlyI0vdsXsgXgMuQ8
|
|
||||||
pb9Yifn5QQKBgQCmGu0EtYQlyOlDP10EGSrN3Dm45l9CrKZdi326cN4eCkikSoLs
|
|
||||||
G2x/YumouItiydP5QiNzuXOPrbmse4bwumwb2s0nJSMw6iSmDsFMlmuJxW2zO5e0
|
|
||||||
6qGH7fUyhgcaTanJIfk6hrm7/mKkH/S4hGpYCc8NCRsmc/35M+D4AoAoYQKBgQC0
|
|
||||||
LWpZaxDlF30MbAHHN3l6We2iU+vup0sMYXGb2ZOcwa/fir+ozIr++l8VmJmdWTan
|
|
||||||
OWSM96zgMghx8Os4hhJTxF+rvqK242OfcVsc2x31X94zUaP2z+peh5uhA6Pb3Nxr
|
|
||||||
W+iyA9k+Vujiwhr+h5D3VvtvH++aG6/KpGtoCf5nAQKBgQDXX2+d7bd5CLNLLFNd
|
|
||||||
M2i4QoOFcSKIG+v4SuvgEJHgG8vGvxh2qlSxnMWuPV+7/1P5ATLqDj1PlKms+BNR
|
|
||||||
y7sc5AT9PclkL3Y9MNzOu0LXyBkGYcl8M0EQfLv9VPbWT+NXiMg/O2CHiT02pAAz
|
|
||||||
uQicoQq3yzeQh20wtrtaXzTNmA==
|
|
||||||
-----END PRIVATE KEY-----
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIID+jCCA6CgAwIBAgIUJhFxUKEGvTRc3CjCok6dbPGH/P4wCgYIKoZIzj0EAwIw
|
|
||||||
gagxCzAJBgNVBAYTAlVTMRkwFwYDVQQKExBDbG91ZEZsYXJlLCBJbmMuMTgwNgYD
|
|
||||||
VQQLEy9DbG91ZEZsYXJlIE9yaWdpbiBTU0wgRUNDIENlcnRpZmljYXRlIEF1dGhv
|
|
||||||
cml0eTEWMBQGA1UEBxMNU2FuIEZyYW5jaXNjbzETMBEGA1UECBMKQ2FsaWZvcm5p
|
|
||||||
YTEXMBUGA1UEAxMOKGRldiB1c2Ugb25seSkwHhcNMTcxMDEzMTM1OTAwWhcNMzIx
|
|
||||||
MDA5MTM1OTAwWjBiMRkwFwYDVQQKExBDbG91ZEZsYXJlLCBJbmMuMR0wGwYDVQQL
|
|
||||||
ExRDbG91ZEZsYXJlIE9yaWdpbiBDQTEmMCQGA1UEAxMdQ2xvdWRGbGFyZSBPcmln
|
|
||||||
aW4gQ2VydGlmaWNhdGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCf
|
|
||||||
GswL16Fz9Ei3sAg5AmBizoN2nZdyXHP8T57UxUMcrlJXEEXCVS5RR4m9l+EmK0ng
|
|
||||||
6yHR1H5oX1Lg1WKyXgWwr0whwmdTD+qWFJW2M8HyefyBKLrsGPuxw4CVYT0h72bx
|
|
||||||
tG0uyrXYh7Mtz0lHjGV90qrFpq5o0jx0sLbDlDvpFPbIO58uYzKG4Sn2VTC4rOyX
|
|
||||||
PE6SuDvMHIeX6Ekw4wSVQ9eTbksLQqTyxSqM3zp2ygc56SjGjy1nGQT8ZBGFzSbZ
|
|
||||||
AzNOxVKrUsySx7LzZVl+zCGCPlQwaYLKObKXadZJmrqSFmErC5jcbVgBz7oJQOgl
|
|
||||||
HJ2n0sMcZ+Ja1Y649mPVAgMBAAGjggEgMIIBHDAOBgNVHQ8BAf8EBAMCBaAwEwYD
|
|
||||||
VR0lBAwwCgYIKwYBBQUHAwEwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUzA6f2Ajq
|
|
||||||
zhX67c6piY2a1uTiUkwwHwYDVR0jBBgwFoAU2qfBlqxKMZnf0QeTeYiMelfqJfgw
|
|
||||||
RAYIKwYBBQUHAQEEODA2MDQGCCsGAQUFBzABhihodHRwOi8vb2NzcC5jbG91ZGZs
|
|
||||||
YXJlLmNvbS9vcmlnaW5fZWNjX2NhMCMGA1UdEQQcMBqCDCouYXJub2xkLmNvbYIK
|
|
||||||
YXJub2xkLmNvbTA8BgNVHR8ENTAzMDGgL6AthitodHRwOi8vY3JsLmNsb3VkZmxh
|
|
||||||
cmUuY29tL29yaWdpbl9lY2NfY2EuY3JsMAoGCCqGSM49BAMCA0gAMEUCIDV7HoMj
|
|
||||||
K5rShE/l+90YAOzHC89OH/wUz3I5KYOFuehoAiEA8e92aIf9XBkr0K6EvFCiSsD+
|
|
||||||
x+Yo/cL8fGfVpPt4UM8=
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIID+jCCA6CgAwIBAgIUJhFxUKEGvTRc3CjCok6dbPGH/P4wCgYIKoZIzj0EAwIw
|
|
||||||
gagxCzAJBgNVBAYTAlVTMRkwFwYDVQQKExBDbG91ZEZsYXJlLCBJbmMuMTgwNgYD
|
|
||||||
VQQLEy9DbG91ZEZsYXJlIE9yaWdpbiBTU0wgRUNDIENlcnRpZmljYXRlIEF1dGhv
|
|
||||||
cml0eTEWMBQGA1UEBxMNU2FuIEZyYW5jaXNjbzETMBEGA1UECBMKQ2FsaWZvcm5p
|
|
||||||
YTEXMBUGA1UEAxMOKGRldiB1c2Ugb25seSkwHhcNMTcxMDEzMTM1OTAwWhcNMzIx
|
|
||||||
MDA5MTM1OTAwWjBiMRkwFwYDVQQKExBDbG91ZEZsYXJlLCBJbmMuMR0wGwYDVQQL
|
|
||||||
ExRDbG91ZEZsYXJlIE9yaWdpbiBDQTEmMCQGA1UEAxMdQ2xvdWRGbGFyZSBPcmln
|
|
||||||
aW4gQ2VydGlmaWNhdGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCf
|
|
||||||
GswL16Fz9Ei3sAg5AmBizoN2nZdyXHP8T57UxUMcrlJXEEXCVS5RR4m9l+EmK0ng
|
|
||||||
6yHR1H5oX1Lg1WKyXgWwr0whwmdTD+qWFJW2M8HyefyBKLrsGPuxw4CVYT0h72bx
|
|
||||||
tG0uyrXYh7Mtz0lHjGV90qrFpq5o0jx0sLbDlDvpFPbIO58uYzKG4Sn2VTC4rOyX
|
|
||||||
PE6SuDvMHIeX6Ekw4wSVQ9eTbksLQqTyxSqM3zp2ygc56SjGjy1nGQT8ZBGFzSbZ
|
|
||||||
AzNOxVKrUsySx7LzZVl+zCGCPlQwaYLKObKXadZJmrqSFmErC5jcbVgBz7oJQOgl
|
|
||||||
HJ2n0sMcZ+Ja1Y649mPVAgMBAAGjggEgMIIBHDAOBgNVHQ8BAf8EBAMCBaAwEwYD
|
|
||||||
VR0lBAwwCgYIKwYBBQUHAwEwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUzA6f2Ajq
|
|
||||||
zhX67c6piY2a1uTiUkwwHwYDVR0jBBgwFoAU2qfBlqxKMZnf0QeTeYiMelfqJfgw
|
|
||||||
RAYIKwYBBQUHAQEEODA2MDQGCCsGAQUFBzABhihodHRwOi8vb2NzcC5jbG91ZGZs
|
|
||||||
YXJlLmNvbS9vcmlnaW5fZWNjX2NhMCMGA1UdEQQcMBqCDCouYXJub2xkLmNvbYIK
|
|
||||||
YXJub2xkLmNvbTA8BgNVHR8ENTAzMDGgL6AthitodHRwOi8vY3JsLmNsb3VkZmxh
|
|
||||||
cmUuY29tL29yaWdpbl9lY2NfY2EuY3JsMAoGCCqGSM49BAMCA0gAMEUCIDV7HoMj
|
|
||||||
K5rShE/l+90YAOzHC89OH/wUz3I5KYOFuehoAiEA8e92aIf9XBkr0K6EvFCiSsD+
|
|
||||||
x+Yo/cL8fGfVpPt4UM8=
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
-----BEGIN WARP TOKEN-----
|
|
||||||
N2IwYTRkNzdkZmI4ODFjMWEzYjdkNjFlYTk0NDNlMTkKdjEuMC01OGJkNGY5ZTI4
|
|
||||||
ZjdiM2MyOGUwNWEzNWZmM2U4MGFiNGZkOTY0NGVmM2ZlY2U1MzdlYjBkMTJlMmU5
|
|
||||||
MjU4MjE3LTE4MzQ0MmZiYjBiYmRiM2U1NzE1NThmZWM5YjU1ODllYmQ3N2FhZmM4
|
|
||||||
NzQ5OGVlM2YwOWY2NGE0YWQ3OWZmZTg3OTFlZGJhZTA4YjM2YzFkOGYxZDcwYTg2
|
|
||||||
NzBkZTU2OTIyZGZmOTJiMTVkMjE0YTUyNGY0ZWJmYTE5NTg4NTllLTdjZTgwZjc5
|
|
||||||
OTIxMzEyYTYwMjJjNWQyNWUyZDM4MGY4MmNlYWVmZTNmYmRjNDNkZDEzYjA4MGUz
|
|
||||||
ZWYxZTI2Zjc=
|
|
||||||
-----END WARP TOKEN-----
|
|
|
@ -1,61 +0,0 @@
|
||||||
-----BEGIN PRIVATE KEY-----
|
|
||||||
MIIEvwIBADANBgkqhkiG9w0BAQEFAASCBKkwggSlAgEAAoIBAQCfGswL16Fz9Ei3
|
|
||||||
sAg5AmBizoN2nZdyXHP8T57UxUMcrlJXEEXCVS5RR4m9l+EmK0ng6yHR1H5oX1Lg
|
|
||||||
1WKyXgWwr0whwmdTD+qWFJW2M8HyefyBKLrsGPuxw4CVYT0h72bxtG0uyrXYh7Mt
|
|
||||||
z0lHjGV90qrFpq5o0jx0sLbDlDvpFPbIO58uYzKG4Sn2VTC4rOyXPE6SuDvMHIeX
|
|
||||||
6Ekw4wSVQ9eTbksLQqTyxSqM3zp2ygc56SjGjy1nGQT8ZBGFzSbZAzNOxVKrUsyS
|
|
||||||
x7LzZVl+zCGCPlQwaYLKObKXadZJmrqSFmErC5jcbVgBz7oJQOglHJ2n0sMcZ+Ja
|
|
||||||
1Y649mPVAgMBAAECggEAEbPF0ah9fH0IzTU/CPbIeh3flyY8GDuMpR1HvwUurSWB
|
|
||||||
IFI9bLyVAXKb8vYP1TMaTnXi5qmFof+/JShgyZc3+1tZtWTfoaiC8Y1bRfE2yk+D
|
|
||||||
xmwddhDmijYGG7i8uEaeddSdFEh2GKAqkbV/QgBvN2Nl4EVmIOAJXXNe9l5LFyjy
|
|
||||||
sR10aNVJRYV1FahrCTwZ3SovHP4d4AUvHh/3FFZDukHc37CFA0+CcR4uehp5yedi
|
|
||||||
2UdqaszXqunFo/3h+Tn9dW2C7gTTZx4+mfyaws3p3YOmdYArXvpejxHIc0FGwLBm
|
|
||||||
sb9K7wGVUiF0Bt0ch+C1mdYrCaFNHnPuDswjmm3FwQKBgQDYtxOwwSLA6ZyppozX
|
|
||||||
Doyx9a7PhiMHCFKSdVB4l8rpK545a+AmpG6LRScTtBsMTHBhT3IQ3QPWlVm1AhjF
|
|
||||||
AvXMa1rOeaGbCbDn1xqEoEVPtj4tys8eTfyWmtU73jWTFauOt4/xpf/urEpg91xj
|
|
||||||
m+Gl/8qgBrpm5rQxV5Y4MysRlQKBgQC78jzzlhocXGNvw0wT/K2NsknyeoZXqpIE
|
|
||||||
QYL60FMl4geZn6w9hwxaL1r+g/tUjTnpBPQtS1r2Ed2gXby5zspN1g/PW8U3t3to
|
|
||||||
P7zHIJ/sLBXrCh5RJko3hUgGhDNOOCIQj4IaKUfvHYvEIbIxlyI0vdsXsgXgMuQ8
|
|
||||||
pb9Yifn5QQKBgQCmGu0EtYQlyOlDP10EGSrN3Dm45l9CrKZdi326cN4eCkikSoLs
|
|
||||||
G2x/YumouItiydP5QiNzuXOPrbmse4bwumwb2s0nJSMw6iSmDsFMlmuJxW2zO5e0
|
|
||||||
6qGH7fUyhgcaTanJIfk6hrm7/mKkH/S4hGpYCc8NCRsmc/35M+D4AoAoYQKBgQC0
|
|
||||||
LWpZaxDlF30MbAHHN3l6We2iU+vup0sMYXGb2ZOcwa/fir+ozIr++l8VmJmdWTan
|
|
||||||
OWSM96zgMghx8Os4hhJTxF+rvqK242OfcVsc2x31X94zUaP2z+peh5uhA6Pb3Nxr
|
|
||||||
W+iyA9k+Vujiwhr+h5D3VvtvH++aG6/KpGtoCf5nAQKBgQDXX2+d7bd5CLNLLFNd
|
|
||||||
M2i4QoOFcSKIG+v4SuvgEJHgG8vGvxh2qlSxnMWuPV+7/1P5ATLqDj1PlKms+BNR
|
|
||||||
y7sc5AT9PclkL3Y9MNzOu0LXyBkGYcl8M0EQfLv9VPbWT+NXiMg/O2CHiT02pAAz
|
|
||||||
uQicoQq3yzeQh20wtrtaXzTNmA==
|
|
||||||
-----END PRIVATE KEY-----
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIID+jCCA6CgAwIBAgIUJhFxUKEGvTRc3CjCok6dbPGH/P4wCgYIKoZIzj0EAwIw
|
|
||||||
gagxCzAJBgNVBAYTAlVTMRkwFwYDVQQKExBDbG91ZEZsYXJlLCBJbmMuMTgwNgYD
|
|
||||||
VQQLEy9DbG91ZEZsYXJlIE9yaWdpbiBTU0wgRUNDIENlcnRpZmljYXRlIEF1dGhv
|
|
||||||
cml0eTEWMBQGA1UEBxMNU2FuIEZyYW5jaXNjbzETMBEGA1UECBMKQ2FsaWZvcm5p
|
|
||||||
YTEXMBUGA1UEAxMOKGRldiB1c2Ugb25seSkwHhcNMTcxMDEzMTM1OTAwWhcNMzIx
|
|
||||||
MDA5MTM1OTAwWjBiMRkwFwYDVQQKExBDbG91ZEZsYXJlLCBJbmMuMR0wGwYDVQQL
|
|
||||||
ExRDbG91ZEZsYXJlIE9yaWdpbiBDQTEmMCQGA1UEAxMdQ2xvdWRGbGFyZSBPcmln
|
|
||||||
aW4gQ2VydGlmaWNhdGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCf
|
|
||||||
GswL16Fz9Ei3sAg5AmBizoN2nZdyXHP8T57UxUMcrlJXEEXCVS5RR4m9l+EmK0ng
|
|
||||||
6yHR1H5oX1Lg1WKyXgWwr0whwmdTD+qWFJW2M8HyefyBKLrsGPuxw4CVYT0h72bx
|
|
||||||
tG0uyrXYh7Mtz0lHjGV90qrFpq5o0jx0sLbDlDvpFPbIO58uYzKG4Sn2VTC4rOyX
|
|
||||||
PE6SuDvMHIeX6Ekw4wSVQ9eTbksLQqTyxSqM3zp2ygc56SjGjy1nGQT8ZBGFzSbZ
|
|
||||||
AzNOxVKrUsySx7LzZVl+zCGCPlQwaYLKObKXadZJmrqSFmErC5jcbVgBz7oJQOgl
|
|
||||||
HJ2n0sMcZ+Ja1Y649mPVAgMBAAGjggEgMIIBHDAOBgNVHQ8BAf8EBAMCBaAwEwYD
|
|
||||||
VR0lBAwwCgYIKwYBBQUHAwEwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUzA6f2Ajq
|
|
||||||
zhX67c6piY2a1uTiUkwwHwYDVR0jBBgwFoAU2qfBlqxKMZnf0QeTeYiMelfqJfgw
|
|
||||||
RAYIKwYBBQUHAQEEODA2MDQGCCsGAQUFBzABhihodHRwOi8vb2NzcC5jbG91ZGZs
|
|
||||||
YXJlLmNvbS9vcmlnaW5fZWNjX2NhMCMGA1UdEQQcMBqCDCouYXJub2xkLmNvbYIK
|
|
||||||
YXJub2xkLmNvbTA8BgNVHR8ENTAzMDGgL6AthitodHRwOi8vY3JsLmNsb3VkZmxh
|
|
||||||
cmUuY29tL29yaWdpbl9lY2NfY2EuY3JsMAoGCCqGSM49BAMCA0gAMEUCIDV7HoMj
|
|
||||||
K5rShE/l+90YAOzHC89OH/wUz3I5KYOFuehoAiEA8e92aIf9XBkr0K6EvFCiSsD+
|
|
||||||
x+Yo/cL8fGfVpPt4UM8=
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
-----BEGIN WARP TOKEN-----
|
|
||||||
N2IwYTRkNzdkZmI4ODFjMWEzYjdkNjFlYTk0NDNlMTkKdjEuMC01OGJkNGY5ZTI4
|
|
||||||
ZjdiM2MyOGUwNWEzNWZmM2U4MGFiNGZkOTY0NGVmM2ZlY2U1MzdlYjBkMTJlMmU5
|
|
||||||
MjU4MjE3LTE4MzQ0MmZiYjBiYmRiM2U1NzE1NThmZWM5YjU1ODllYmQ3N2FhZmM4
|
|
||||||
NzQ5OGVlM2YwOWY2NGE0YWQ3OWZmZTg3OTFlZGJhZTA4YjM2YzFkOGYxZDcwYTg2
|
|
||||||
NzBkZTU2OTIyZGZmOTJiMTVkMjE0YTUyNGY0ZWJmYTE5NTg4NTllLTdjZTgwZjc5
|
|
||||||
OTIxMzEyYTYwMjJjNWQyNWUyZDM4MGY4MmNlYWVmZTNmYmRjNDNkZDEzYjA4MGUz
|
|
||||||
ZWYxZTI2Zjc=
|
|
||||||
-----END WARP TOKEN-----
|
|
|
@ -104,7 +104,7 @@ func (r *RESTClient) sendRequest(method string, url url.URL, body interface{}) (
|
||||||
if bodyReader != nil {
|
if bodyReader != nil {
|
||||||
req.Header.Set("Content-Type", jsonContentType)
|
req.Header.Set("Content-Type", jsonContentType)
|
||||||
}
|
}
|
||||||
req.Header.Add("X-Auth-User-Service-Key", r.authToken)
|
req.Header.Add("Authorization", fmt.Sprintf("Bearer %s", r.authToken))
|
||||||
req.Header.Add("Accept", "application/json;version=1")
|
req.Header.Add("Accept", "application/json;version=1")
|
||||||
return r.client.Do(req)
|
return r.client.Do(req)
|
||||||
}
|
}
|
||||||
|
|
|
@ -8,6 +8,7 @@ type TunnelClient interface {
|
||||||
CreateTunnel(name string, tunnelSecret []byte) (*TunnelWithToken, error)
|
CreateTunnel(name string, tunnelSecret []byte) (*TunnelWithToken, error)
|
||||||
GetTunnel(tunnelID uuid.UUID) (*Tunnel, error)
|
GetTunnel(tunnelID uuid.UUID) (*Tunnel, error)
|
||||||
GetTunnelToken(tunnelID uuid.UUID) (string, error)
|
GetTunnelToken(tunnelID uuid.UUID) (string, error)
|
||||||
|
GetManagementToken(tunnelID uuid.UUID) (string, error)
|
||||||
DeleteTunnel(tunnelID uuid.UUID) error
|
DeleteTunnel(tunnelID uuid.UUID) error
|
||||||
ListTunnels(filter *TunnelFilter) ([]*Tunnel, error)
|
ListTunnels(filter *TunnelFilter) ([]*Tunnel, error)
|
||||||
ListActiveClients(tunnelID uuid.UUID) ([]*ActiveClient, error)
|
ListActiveClients(tunnelID uuid.UUID) ([]*ActiveClient, error)
|
||||||
|
@ -28,7 +29,7 @@ type IPRouteClient interface {
|
||||||
type VnetClient interface {
|
type VnetClient interface {
|
||||||
CreateVirtualNetwork(newVnet NewVirtualNetwork) (VirtualNetwork, error)
|
CreateVirtualNetwork(newVnet NewVirtualNetwork) (VirtualNetwork, error)
|
||||||
ListVirtualNetworks(filter *VnetFilter) ([]*VirtualNetwork, error)
|
ListVirtualNetworks(filter *VnetFilter) ([]*VirtualNetwork, error)
|
||||||
DeleteVirtualNetwork(id uuid.UUID) error
|
DeleteVirtualNetwork(id uuid.UUID, force bool) error
|
||||||
UpdateVirtualNetwork(id uuid.UUID, updates UpdateVirtualNetwork) error
|
UpdateVirtualNetwork(id uuid.UUID, updates UpdateVirtualNetwork) error
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -50,6 +50,10 @@ type newTunnel struct {
|
||||||
TunnelSecret []byte `json:"tunnel_secret"`
|
TunnelSecret []byte `json:"tunnel_secret"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type managementRequest struct {
|
||||||
|
Resources []string `json:"resources"`
|
||||||
|
}
|
||||||
|
|
||||||
type CleanupParams struct {
|
type CleanupParams struct {
|
||||||
queryParams url.Values
|
queryParams url.Values
|
||||||
}
|
}
|
||||||
|
@ -133,6 +137,28 @@ func (r *RESTClient) GetTunnelToken(tunnelID uuid.UUID) (token string, err error
|
||||||
return "", r.statusCodeToError("get tunnel token", resp)
|
return "", r.statusCodeToError("get tunnel token", resp)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (r *RESTClient) GetManagementToken(tunnelID uuid.UUID) (token string, err error) {
|
||||||
|
endpoint := r.baseEndpoints.accountLevel
|
||||||
|
endpoint.Path = path.Join(endpoint.Path, fmt.Sprintf("%v/management", tunnelID))
|
||||||
|
|
||||||
|
body := &managementRequest{
|
||||||
|
Resources: []string{"logs"},
|
||||||
|
}
|
||||||
|
|
||||||
|
resp, err := r.sendRequest("POST", endpoint, body)
|
||||||
|
if err != nil {
|
||||||
|
return "", errors.Wrap(err, "REST request failed")
|
||||||
|
}
|
||||||
|
defer resp.Body.Close()
|
||||||
|
|
||||||
|
if resp.StatusCode == http.StatusOK {
|
||||||
|
err = parseResponse(resp.Body, &token)
|
||||||
|
return token, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return "", r.statusCodeToError("get tunnel token", resp)
|
||||||
|
}
|
||||||
|
|
||||||
func (r *RESTClient) DeleteTunnel(tunnelID uuid.UUID) error {
|
func (r *RESTClient) DeleteTunnel(tunnelID uuid.UUID) error {
|
||||||
endpoint := r.baseEndpoints.accountLevel
|
endpoint := r.baseEndpoints.accountLevel
|
||||||
endpoint.Path = path.Join(endpoint.Path, fmt.Sprintf("%v", tunnelID))
|
endpoint.Path = path.Join(endpoint.Path, fmt.Sprintf("%v", tunnelID))
|
||||||
|
|
|
@ -80,9 +80,16 @@ func (r *RESTClient) ListVirtualNetworks(filter *VnetFilter) ([]*VirtualNetwork,
|
||||||
return nil, r.statusCodeToError("list virtual networks", resp)
|
return nil, r.statusCodeToError("list virtual networks", resp)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (r *RESTClient) DeleteVirtualNetwork(id uuid.UUID) error {
|
func (r *RESTClient) DeleteVirtualNetwork(id uuid.UUID, force bool) error {
|
||||||
endpoint := r.baseEndpoints.accountVnets
|
endpoint := r.baseEndpoints.accountVnets
|
||||||
endpoint.Path = path.Join(endpoint.Path, url.PathEscape(id.String()))
|
endpoint.Path = path.Join(endpoint.Path, url.PathEscape(id.String()))
|
||||||
|
|
||||||
|
queryParams := url.Values{}
|
||||||
|
if force {
|
||||||
|
queryParams.Set("force", strconv.FormatBool(force))
|
||||||
|
}
|
||||||
|
endpoint.RawQuery = queryParams.Encode()
|
||||||
|
|
||||||
resp, err := r.sendRequest("DELETE", endpoint, nil)
|
resp, err := r.sendRequest("DELETE", endpoint, nil)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errors.Wrap(err, "REST request failed")
|
return errors.Wrap(err, "REST request failed")
|
||||||
|
|
11
cfsetup.yaml
11
cfsetup.yaml
|
@ -1,9 +1,9 @@
|
||||||
pinned_go: &pinned_go go=1.19.3-1
|
pinned_go: &pinned_go go=1.19.6-1
|
||||||
pinned_go_fips: &pinned_go_fips go-boring=1.19.3-1
|
pinned_go_fips: &pinned_go_fips go-boring=1.19.6-1
|
||||||
|
|
||||||
build_dir: &build_dir /cfsetup_build
|
build_dir: &build_dir /cfsetup_build
|
||||||
default-flavor: bullseye
|
default-flavor: bullseye
|
||||||
stretch: &stretch
|
buster: &buster
|
||||||
build:
|
build:
|
||||||
build_dir: *build_dir
|
build_dir: *build_dir
|
||||||
builddeps: &build_deps
|
builddeps: &build_deps
|
||||||
|
@ -268,6 +268,5 @@ stretch: &stretch
|
||||||
- export GOARCH=amd64
|
- export GOARCH=amd64
|
||||||
- make publish-cloudflared-junos
|
- make publish-cloudflared-junos
|
||||||
|
|
||||||
buster: *stretch
|
bullseye: *buster
|
||||||
bullseye: *stretch
|
bookworm: *buster
|
||||||
bookworm: *stretch
|
|
||||||
|
|
|
@ -1,62 +1,64 @@
|
||||||
<?xml version="1.0"?>
|
<?xml version="1.0"?>
|
||||||
|
|
||||||
<?if $(var.Platform)="x86"?>
|
<?if $(var.Platform)="x64" ?>
|
||||||
<?define Program_Files="ProgramFilesFolder"?>
|
|
||||||
<?else?>
|
|
||||||
<?define Program_Files="ProgramFiles64Folder"?>
|
<?define Program_Files="ProgramFiles64Folder"?>
|
||||||
<?endif?>
|
<?else ?>
|
||||||
|
<?define Program_Files="ProgramFilesFolder"?>
|
||||||
|
<?endif ?>
|
||||||
<?ifndef var.Version?>
|
<?ifndef var.Version?>
|
||||||
<?error Undefined Version variable?>
|
<?error Undefined Version variable?>
|
||||||
<?endif?>
|
<?endif ?>
|
||||||
<?ifndef var.Path?>
|
<?ifndef var.Path?>
|
||||||
<?error Undefined Path variable?>
|
<?error Undefined Path variable?>
|
||||||
<?endif?>
|
<?endif ?>
|
||||||
|
|
||||||
<Wix xmlns="http://schemas.microsoft.com/wix/2006/wi">
|
<Wix xmlns="http://schemas.microsoft.com/wix/2006/wi">
|
||||||
<Product Id="35e5e858-9372-4449-bf73-1cd6f7267128"
|
<Product Id="*"
|
||||||
UpgradeCode="23f90fdd-9328-47ea-ab52-5380855a4b12"
|
UpgradeCode="23f90fdd-9328-47ea-ab52-5380855a4b12"
|
||||||
Name="cloudflared"
|
Name="cloudflared"
|
||||||
Version="$(var.Version)"
|
Version="$(var.Version)"
|
||||||
Manufacturer="cloudflare"
|
Manufacturer="cloudflare"
|
||||||
Language="1033">
|
Language="1033">
|
||||||
|
|
||||||
<Package InstallerVersion="200" Compressed="yes" Comments="Windows Installer Package" InstallScope="perMachine"/>
|
<Package InstallerVersion="200" Compressed="yes" Comments="Windows Installer Package" InstallScope="perMachine" />
|
||||||
|
|
||||||
<Media Id="1" Cabinet="product.cab" EmbedCab="yes"/>
|
<Media Id="1" Cabinet="product.cab" EmbedCab="yes" />
|
||||||
|
|
||||||
<Upgrade Id="23f90fdd-9328-47ea-ab52-5380855a4b12">
|
<MajorUpgrade DowngradeErrorMessage="A later version of [ProductName] is already installed. Setup will now exit." />
|
||||||
<UpgradeVersion Minimum="$(var.Version)" OnlyDetect="yes" Property="NEWERVERSIONDETECTED"/>
|
|
||||||
<UpgradeVersion Minimum="2020.8.0" Maximum="$(var.Version)" IncludeMinimum="yes" IncludeMaximum="no"
|
|
||||||
Property="OLDERVERSIONBEINGUPGRADED"/>
|
|
||||||
</Upgrade>
|
|
||||||
<Condition Message="A newer version of this software is already installed.">NOT NEWERVERSIONDETECTED</Condition>
|
|
||||||
|
|
||||||
<Directory Id="TARGETDIR" Name="SourceDir">
|
<Upgrade Id="23f90fdd-9328-47ea-ab52-5380855a4b12">
|
||||||
<!--This specifies where the cloudflared.exe is moved to in the windows Operation System-->
|
<UpgradeVersion Minimum="$(var.Version)" OnlyDetect="yes" Property="NEWERVERSIONDETECTED" />
|
||||||
<Directory Id="$(var.Program_Files)">
|
<UpgradeVersion Minimum="2020.8.0" Maximum="$(var.Version)" IncludeMinimum="yes" IncludeMaximum="no"
|
||||||
<Directory Id="INSTALLDIR" Name="cloudflared">
|
Property="OLDERVERSIONBEINGUPGRADED" />
|
||||||
<Component Id="ApplicationFiles" Guid="35e5e858-9372-4449-bf73-1cd6f7267128">
|
</Upgrade>
|
||||||
<File Id="ApplicationFile0" Source="$(var.Path)"/>
|
<Condition Message="A newer version of this software is already installed.">NOT NEWERVERSIONDETECTED</Condition>
|
||||||
</Component>
|
|
||||||
|
<Directory Id="TARGETDIR" Name="SourceDir">
|
||||||
|
<!--This specifies where the cloudflared.exe is moved to in the windows Operation System-->
|
||||||
|
<Directory Id="$(var.Program_Files)">
|
||||||
|
<Directory Id="INSTALLDIR" Name="cloudflared">
|
||||||
|
<Component Id="ApplicationFiles" Guid="35e5e858-9372-4449-bf73-1cd6f7267128">
|
||||||
|
<File Id="ApplicationFile0" Source="$(var.Path)" />
|
||||||
|
</Component>
|
||||||
|
</Directory>
|
||||||
</Directory>
|
</Directory>
|
||||||
|
<Component Id="ENVS" Guid="6bb74449-d10d-4f4a-933e-6fc9fa006eae">
|
||||||
|
<!--Set the cloudflared bin location to the Path Environment Variable-->
|
||||||
|
<Environment Id="ENV0"
|
||||||
|
Name="PATH"
|
||||||
|
Value="[INSTALLDIR]."
|
||||||
|
Permanent="no"
|
||||||
|
Part="last"
|
||||||
|
Action="create"
|
||||||
|
System="yes" />
|
||||||
|
</Component>
|
||||||
</Directory>
|
</Directory>
|
||||||
<Component Id="ENVS" Guid="6bb74449-d10d-4f4a-933e-6fc9fa006eae">
|
|
||||||
<!--Set the cloudflared bin location to the Path Environment Variable-->
|
|
||||||
<Environment Id="ENV0"
|
|
||||||
Name="PATH"
|
|
||||||
Value="[INSTALLDIR]."
|
|
||||||
Permanent="no"
|
|
||||||
Part="last"
|
|
||||||
Action="create"
|
|
||||||
System="yes" />
|
|
||||||
</Component>
|
|
||||||
</Directory>
|
|
||||||
|
|
||||||
|
|
||||||
<Feature Id='Complete' Level='1'>
|
<Feature Id='Complete' Level='1'>
|
||||||
<ComponentRef Id="ENVS"/>
|
<ComponentRef Id="ENVS" />
|
||||||
<ComponentRef Id='ApplicationFiles' />
|
<ComponentRef Id='ApplicationFiles' />
|
||||||
</Feature>
|
</Feature>
|
||||||
|
|
||||||
</Product>
|
</Product>
|
||||||
</Wix>
|
</Wix>
|
||||||
|
|
|
@ -12,7 +12,7 @@ import (
|
||||||
"text/template"
|
"text/template"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/getsentry/raven-go"
|
"github.com/getsentry/sentry-go"
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
"github.com/rs/zerolog"
|
"github.com/rs/zerolog"
|
||||||
"github.com/urfave/cli/v2"
|
"github.com/urfave/cli/v2"
|
||||||
|
@ -213,7 +213,11 @@ func Commands() []*cli.Command {
|
||||||
|
|
||||||
// login pops up the browser window to do the actual login and JWT generation
|
// login pops up the browser window to do the actual login and JWT generation
|
||||||
func login(c *cli.Context) error {
|
func login(c *cli.Context) error {
|
||||||
if err := raven.SetDSN(sentryDSN); err != nil {
|
err := sentry.Init(sentry.ClientOptions{
|
||||||
|
Dsn: sentryDSN,
|
||||||
|
Release: c.App.Version,
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -262,7 +266,11 @@ func ensureURLScheme(url string) string {
|
||||||
|
|
||||||
// curl provides a wrapper around curl, passing Access JWT along in request
|
// curl provides a wrapper around curl, passing Access JWT along in request
|
||||||
func curl(c *cli.Context) error {
|
func curl(c *cli.Context) error {
|
||||||
if err := raven.SetDSN(sentryDSN); err != nil {
|
err := sentry.Init(sentry.ClientOptions{
|
||||||
|
Dsn: sentryDSN,
|
||||||
|
Release: c.App.Version,
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
log := logger.CreateLoggerFromContext(c, logger.EnableTerminalLog)
|
log := logger.CreateLoggerFromContext(c, logger.EnableTerminalLog)
|
||||||
|
@ -283,6 +291,13 @@ func curl(c *cli.Context) error {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Verify that the existing token is still good; if not fetch a new one
|
||||||
|
if err := verifyTokenAtEdge(appURL, appInfo, c, log); err != nil {
|
||||||
|
log.Err(err).Msg("Could not verify token")
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
tok, err := token.GetAppTokenIfExists(appInfo)
|
tok, err := token.GetAppTokenIfExists(appInfo)
|
||||||
if err != nil || tok == "" {
|
if err != nil || tok == "" {
|
||||||
if allowRequest {
|
if allowRequest {
|
||||||
|
@ -325,7 +340,11 @@ func run(cmd string, args ...string) error {
|
||||||
|
|
||||||
// token dumps provided token to stdout
|
// token dumps provided token to stdout
|
||||||
func generateToken(c *cli.Context) error {
|
func generateToken(c *cli.Context) error {
|
||||||
if err := raven.SetDSN(sentryDSN); err != nil {
|
err := sentry.Init(sentry.ClientOptions{
|
||||||
|
Dsn: sentryDSN,
|
||||||
|
Release: c.App.Version,
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
appURL, err := url.Parse(ensureURLScheme(c.String("app")))
|
appURL, err := url.Parse(ensureURLScheme(c.String("app")))
|
||||||
|
|
|
@ -47,3 +47,7 @@ func (bi *BuildInfo) GetBuildTypeMsg() string {
|
||||||
}
|
}
|
||||||
return fmt.Sprintf(" with %s", bi.BuildType)
|
return fmt.Sprintf(" with %s", bi.BuildType)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (bi *BuildInfo) UserAgent() string {
|
||||||
|
return fmt.Sprintf("cloudflared/%s", bi.CloudflaredVersion)
|
||||||
|
}
|
||||||
|
|
|
@ -0,0 +1,51 @@
|
||||||
|
package cliutil
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/urfave/cli/v2"
|
||||||
|
"github.com/urfave/cli/v2/altsrc"
|
||||||
|
|
||||||
|
"github.com/cloudflare/cloudflared/logger"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
debugLevelWarning = "At debug level cloudflared will log request URL, method, protocol, content length, as well as, all request and response headers. " +
|
||||||
|
"This can expose sensitive information in your logs."
|
||||||
|
)
|
||||||
|
|
||||||
|
func ConfigureLoggingFlags(shouldHide bool) []cli.Flag {
|
||||||
|
return []cli.Flag{
|
||||||
|
altsrc.NewStringFlag(&cli.StringFlag{
|
||||||
|
Name: logger.LogLevelFlag,
|
||||||
|
Value: "info",
|
||||||
|
Usage: "Application logging level {debug, info, warn, error, fatal}. " + debugLevelWarning,
|
||||||
|
EnvVars: []string{"TUNNEL_LOGLEVEL"},
|
||||||
|
Hidden: shouldHide,
|
||||||
|
}),
|
||||||
|
altsrc.NewStringFlag(&cli.StringFlag{
|
||||||
|
Name: logger.LogTransportLevelFlag,
|
||||||
|
Aliases: []string{"proto-loglevel"}, // This flag used to be called proto-loglevel
|
||||||
|
Value: "info",
|
||||||
|
Usage: "Transport logging level(previously called protocol logging level) {debug, info, warn, error, fatal}",
|
||||||
|
EnvVars: []string{"TUNNEL_PROTO_LOGLEVEL", "TUNNEL_TRANSPORT_LOGLEVEL"},
|
||||||
|
Hidden: shouldHide,
|
||||||
|
}),
|
||||||
|
altsrc.NewStringFlag(&cli.StringFlag{
|
||||||
|
Name: logger.LogFileFlag,
|
||||||
|
Usage: "Save application log to this file for reporting issues.",
|
||||||
|
EnvVars: []string{"TUNNEL_LOGFILE"},
|
||||||
|
Hidden: shouldHide,
|
||||||
|
}),
|
||||||
|
altsrc.NewStringFlag(&cli.StringFlag{
|
||||||
|
Name: logger.LogDirectoryFlag,
|
||||||
|
Usage: "Save application log to this directory for reporting issues.",
|
||||||
|
EnvVars: []string{"TUNNEL_LOGDIRECTORY"},
|
||||||
|
Hidden: shouldHide,
|
||||||
|
}),
|
||||||
|
altsrc.NewStringFlag(&cli.StringFlag{
|
||||||
|
Name: "trace-output",
|
||||||
|
Usage: "Name of trace output file, generated when cloudflared stops.",
|
||||||
|
EnvVars: []string{"TUNNEL_TRACE_OUTPUT"},
|
||||||
|
Hidden: shouldHide,
|
||||||
|
}),
|
||||||
|
}
|
||||||
|
}
|
|
@ -6,7 +6,7 @@ import (
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/getsentry/raven-go"
|
"github.com/getsentry/sentry-go"
|
||||||
homedir "github.com/mitchellh/go-homedir"
|
homedir "github.com/mitchellh/go-homedir"
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
"github.com/urfave/cli/v2"
|
"github.com/urfave/cli/v2"
|
||||||
|
@ -15,6 +15,7 @@ import (
|
||||||
"github.com/cloudflare/cloudflared/cmd/cloudflared/access"
|
"github.com/cloudflare/cloudflared/cmd/cloudflared/access"
|
||||||
"github.com/cloudflare/cloudflared/cmd/cloudflared/cliutil"
|
"github.com/cloudflare/cloudflared/cmd/cloudflared/cliutil"
|
||||||
"github.com/cloudflare/cloudflared/cmd/cloudflared/proxydns"
|
"github.com/cloudflare/cloudflared/cmd/cloudflared/proxydns"
|
||||||
|
"github.com/cloudflare/cloudflared/cmd/cloudflared/tail"
|
||||||
"github.com/cloudflare/cloudflared/cmd/cloudflared/tunnel"
|
"github.com/cloudflare/cloudflared/cmd/cloudflared/tunnel"
|
||||||
"github.com/cloudflare/cloudflared/cmd/cloudflared/updater"
|
"github.com/cloudflare/cloudflared/cmd/cloudflared/updater"
|
||||||
"github.com/cloudflare/cloudflared/config"
|
"github.com/cloudflare/cloudflared/config"
|
||||||
|
@ -50,7 +51,6 @@ var (
|
||||||
func main() {
|
func main() {
|
||||||
rand.Seed(time.Now().UnixNano())
|
rand.Seed(time.Now().UnixNano())
|
||||||
metrics.RegisterBuildInfo(BuildType, BuildTime, Version)
|
metrics.RegisterBuildInfo(BuildType, BuildTime, Version)
|
||||||
raven.SetRelease(Version)
|
|
||||||
maxprocs.Set()
|
maxprocs.Set()
|
||||||
bInfo := cliutil.GetBuildInfo(BuildType, Version)
|
bInfo := cliutil.GetBuildInfo(BuildType, Version)
|
||||||
|
|
||||||
|
@ -90,6 +90,7 @@ func main() {
|
||||||
updater.Init(Version)
|
updater.Init(Version)
|
||||||
tracing.Init(Version)
|
tracing.Init(Version)
|
||||||
token.Init(Version)
|
token.Init(Version)
|
||||||
|
tail.Init(bInfo)
|
||||||
runApp(app, graceShutdownC)
|
runApp(app, graceShutdownC)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -139,6 +140,7 @@ To determine if an update happened in a script, check for error code 11.`,
|
||||||
cmds = append(cmds, tunnel.Commands()...)
|
cmds = append(cmds, tunnel.Commands()...)
|
||||||
cmds = append(cmds, proxydns.Command(false))
|
cmds = append(cmds, proxydns.Command(false))
|
||||||
cmds = append(cmds, access.Commands()...)
|
cmds = append(cmds, access.Commands()...)
|
||||||
|
cmds = append(cmds, tail.Command())
|
||||||
return cmds
|
return cmds
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -156,10 +158,10 @@ func action(graceShutdownC chan struct{}) cli.ActionFunc {
|
||||||
if isEmptyInvocation(c) {
|
if isEmptyInvocation(c) {
|
||||||
return handleServiceMode(c, graceShutdownC)
|
return handleServiceMode(c, graceShutdownC)
|
||||||
}
|
}
|
||||||
tags := make(map[string]string)
|
func() {
|
||||||
tags["hostname"] = c.String("hostname")
|
defer sentry.Recover()
|
||||||
raven.SetTagsContext(tags)
|
err = tunnel.TunnelCommand(c)
|
||||||
raven.CapturePanic(func() { err = tunnel.TunnelCommand(c) }, nil)
|
}()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
captureError(err)
|
captureError(err)
|
||||||
}
|
}
|
||||||
|
@ -187,7 +189,7 @@ func captureError(err error) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
raven.CaptureError(err, nil)
|
sentry.CaptureException(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// cloudflared was started without any flags
|
// cloudflared was started without any flags
|
||||||
|
|
|
@ -1,6 +1,7 @@
|
||||||
package proxydns
|
package proxydns
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"context"
|
||||||
"net"
|
"net"
|
||||||
"os"
|
"os"
|
||||||
"os/signal"
|
"os/signal"
|
||||||
|
@ -73,7 +74,7 @@ func Run(c *cli.Context) error {
|
||||||
log.Fatal().Err(err).Msg("Failed to open the metrics listener")
|
log.Fatal().Err(err).Msg("Failed to open the metrics listener")
|
||||||
}
|
}
|
||||||
|
|
||||||
go metrics.ServeMetrics(metricsListener, nil, nil, "", nil, log)
|
go metrics.ServeMetrics(metricsListener, context.Background(), metrics.Config{}, log)
|
||||||
|
|
||||||
listener, err := tunneldns.CreateListener(
|
listener, err := tunneldns.CreateListener(
|
||||||
c.String("address"),
|
c.String("address"),
|
||||||
|
|
|
@ -0,0 +1,428 @@
|
||||||
|
package tail
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"net/http"
|
||||||
|
"net/url"
|
||||||
|
"os"
|
||||||
|
"os/signal"
|
||||||
|
"syscall"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
"github.com/mattn/go-colorable"
|
||||||
|
"github.com/rs/zerolog"
|
||||||
|
"github.com/urfave/cli/v2"
|
||||||
|
"nhooyr.io/websocket"
|
||||||
|
|
||||||
|
"github.com/cloudflare/cloudflared/cmd/cloudflared/cliutil"
|
||||||
|
"github.com/cloudflare/cloudflared/credentials"
|
||||||
|
"github.com/cloudflare/cloudflared/logger"
|
||||||
|
"github.com/cloudflare/cloudflared/management"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
buildInfo *cliutil.BuildInfo
|
||||||
|
)
|
||||||
|
|
||||||
|
func Init(bi *cliutil.BuildInfo) {
|
||||||
|
buildInfo = bi
|
||||||
|
}
|
||||||
|
|
||||||
|
func Command() *cli.Command {
|
||||||
|
subcommands := []*cli.Command{
|
||||||
|
buildTailManagementTokenSubcommand(),
|
||||||
|
}
|
||||||
|
|
||||||
|
return buildTailCommand(subcommands)
|
||||||
|
}
|
||||||
|
|
||||||
|
func buildTailManagementTokenSubcommand() *cli.Command {
|
||||||
|
return &cli.Command{
|
||||||
|
Name: "token",
|
||||||
|
Action: cliutil.ConfiguredAction(managementTokenCommand),
|
||||||
|
Usage: "Get management access jwt",
|
||||||
|
UsageText: "cloudflared tail token TUNNEL_ID",
|
||||||
|
Description: `Get management access jwt for a tunnel`,
|
||||||
|
Hidden: true,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func managementTokenCommand(c *cli.Context) error {
|
||||||
|
log := createLogger(c)
|
||||||
|
token, err := getManagementToken(c, log)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
var tokenResponse = struct {
|
||||||
|
Token string `json:"token"`
|
||||||
|
}{Token: token}
|
||||||
|
|
||||||
|
return json.NewEncoder(os.Stdout).Encode(tokenResponse)
|
||||||
|
}
|
||||||
|
|
||||||
|
func buildTailCommand(subcommands []*cli.Command) *cli.Command {
|
||||||
|
return &cli.Command{
|
||||||
|
Name: "tail",
|
||||||
|
Action: Run,
|
||||||
|
Usage: "Stream logs from a remote cloudflared",
|
||||||
|
UsageText: "cloudflared tail [tail command options] [TUNNEL-ID]",
|
||||||
|
Flags: []cli.Flag{
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "connector-id",
|
||||||
|
Usage: "Access a specific cloudflared instance by connector id (for when a tunnel has multiple cloudflared's)",
|
||||||
|
Value: "",
|
||||||
|
EnvVars: []string{"TUNNEL_MANAGEMENT_CONNECTOR"},
|
||||||
|
},
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "event",
|
||||||
|
Usage: "Filter by specific Events (cloudflared, http, tcp, udp) otherwise, defaults to send all events",
|
||||||
|
EnvVars: []string{"TUNNEL_MANAGEMENT_FILTER_EVENTS"},
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "level",
|
||||||
|
Usage: "Filter by specific log levels (debug, info, warn, error). Filters by debug log level by default.",
|
||||||
|
EnvVars: []string{"TUNNEL_MANAGEMENT_FILTER_LEVEL"},
|
||||||
|
Value: "debug",
|
||||||
|
},
|
||||||
|
&cli.Float64Flag{
|
||||||
|
Name: "sample",
|
||||||
|
Usage: "Sample log events by percentage (0.0 .. 1.0). No sampling by default.",
|
||||||
|
EnvVars: []string{"TUNNEL_MANAGEMENT_FILTER_SAMPLE"},
|
||||||
|
Value: 1.0,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "token",
|
||||||
|
Usage: "Access token for a specific tunnel",
|
||||||
|
Value: "",
|
||||||
|
EnvVars: []string{"TUNNEL_MANAGEMENT_TOKEN"},
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "output",
|
||||||
|
Usage: "Output format for the logs (default, json)",
|
||||||
|
Value: "default",
|
||||||
|
EnvVars: []string{"TUNNEL_MANAGEMENT_OUTPUT"},
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "management-hostname",
|
||||||
|
Usage: "Management hostname to signify incoming management requests",
|
||||||
|
EnvVars: []string{"TUNNEL_MANAGEMENT_HOSTNAME"},
|
||||||
|
Hidden: true,
|
||||||
|
Value: "management.argotunnel.com",
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "trace",
|
||||||
|
Usage: "Set a cf-trace-id for the request",
|
||||||
|
Hidden: true,
|
||||||
|
Value: "",
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: logger.LogLevelFlag,
|
||||||
|
Value: "info",
|
||||||
|
Usage: "Application logging level {debug, info, warn, error, fatal}",
|
||||||
|
EnvVars: []string{"TUNNEL_LOGLEVEL"},
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: credentials.OriginCertFlag,
|
||||||
|
Usage: "Path to the certificate generated for your origin when you run cloudflared login.",
|
||||||
|
EnvVars: []string{"TUNNEL_ORIGIN_CERT"},
|
||||||
|
Value: credentials.FindDefaultOriginCertPath(),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Subcommands: subcommands,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Middleware validation error struct for returning to the eyeball
|
||||||
|
type managementError struct {
|
||||||
|
Code int `json:"code,omitempty"`
|
||||||
|
Message string `json:"message,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Middleware validation error HTTP response JSON for returning to the eyeball
|
||||||
|
type managementErrorResponse struct {
|
||||||
|
Success bool `json:"success,omitempty"`
|
||||||
|
Errors []managementError `json:"errors,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func handleValidationError(resp *http.Response, log *zerolog.Logger) {
|
||||||
|
if resp.StatusCode == 530 {
|
||||||
|
log.Error().Msgf("no cloudflared connector available or reachable via management request (a recent version of cloudflared is required to use streaming logs)")
|
||||||
|
}
|
||||||
|
var managementErr managementErrorResponse
|
||||||
|
err := json.NewDecoder(resp.Body).Decode(&managementErr)
|
||||||
|
if err != nil {
|
||||||
|
log.Error().Msgf("unable to start management log streaming session: http response code returned %d", resp.StatusCode)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if managementErr.Success || len(managementErr.Errors) == 0 {
|
||||||
|
log.Error().Msgf("management tunnel validation returned success with invalid HTTP response code to convert to a WebSocket request")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
for _, e := range managementErr.Errors {
|
||||||
|
log.Error().Msgf("management request failed validation: (%d) %s", e.Code, e.Message)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// logger will be created to emit only against the os.Stderr as to not obstruct with normal output from
|
||||||
|
// management requests
|
||||||
|
func createLogger(c *cli.Context) *zerolog.Logger {
|
||||||
|
level, levelErr := zerolog.ParseLevel(c.String(logger.LogLevelFlag))
|
||||||
|
if levelErr != nil {
|
||||||
|
level = zerolog.InfoLevel
|
||||||
|
}
|
||||||
|
log := zerolog.New(zerolog.ConsoleWriter{
|
||||||
|
Out: colorable.NewColorable(os.Stderr),
|
||||||
|
TimeFormat: time.RFC3339,
|
||||||
|
}).With().Timestamp().Logger().Level(level)
|
||||||
|
return &log
|
||||||
|
}
|
||||||
|
|
||||||
|
// parseFilters will attempt to parse provided filters to send to with the EventStartStreaming
|
||||||
|
func parseFilters(c *cli.Context) (*management.StreamingFilters, error) {
|
||||||
|
var level *management.LogLevel
|
||||||
|
var events []management.LogEventType
|
||||||
|
var sample float64
|
||||||
|
|
||||||
|
argLevel := c.String("level")
|
||||||
|
argEvents := c.StringSlice("event")
|
||||||
|
argSample := c.Float64("sample")
|
||||||
|
|
||||||
|
if argLevel != "" {
|
||||||
|
l, ok := management.ParseLogLevel(argLevel)
|
||||||
|
if !ok {
|
||||||
|
return nil, fmt.Errorf("invalid --level filter provided, please use one of the following Log Levels: debug, info, warn, error")
|
||||||
|
}
|
||||||
|
level = &l
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, v := range argEvents {
|
||||||
|
t, ok := management.ParseLogEventType(v)
|
||||||
|
if !ok {
|
||||||
|
return nil, fmt.Errorf("invalid --event filter provided, please use one of the following EventTypes: cloudflared, http, tcp, udp")
|
||||||
|
}
|
||||||
|
events = append(events, t)
|
||||||
|
}
|
||||||
|
|
||||||
|
if argSample <= 0.0 || argSample > 1.0 {
|
||||||
|
return nil, fmt.Errorf("invalid --sample value provided, please make sure it is in the range (0.0 .. 1.0)")
|
||||||
|
}
|
||||||
|
sample = argSample
|
||||||
|
|
||||||
|
if level == nil && len(events) == 0 && argSample != 1.0 {
|
||||||
|
// When no filters are provided, do not return a StreamingFilters struct
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return &management.StreamingFilters{
|
||||||
|
Level: level,
|
||||||
|
Events: events,
|
||||||
|
Sampling: sample,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// getManagementToken will make a call to the Cloudflare API to acquire a management token for the requested tunnel.
|
||||||
|
func getManagementToken(c *cli.Context, log *zerolog.Logger) (string, error) {
|
||||||
|
userCreds, err := credentials.Read(c.String(credentials.OriginCertFlag), log)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
|
||||||
|
client, err := userCreds.Client(c.String("api-url"), buildInfo.UserAgent(), log)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
|
||||||
|
tunnelIDString := c.Args().First()
|
||||||
|
if tunnelIDString == "" {
|
||||||
|
return "", errors.New("no tunnel ID provided")
|
||||||
|
}
|
||||||
|
tunnelID, err := uuid.Parse(tunnelIDString)
|
||||||
|
if err != nil {
|
||||||
|
return "", errors.New("unable to parse provided tunnel id as a valid UUID")
|
||||||
|
}
|
||||||
|
|
||||||
|
token, err := client.GetManagementToken(tunnelID)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
|
||||||
|
return token, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// buildURL will build the management url to contain the required query parameters to authenticate the request.
|
||||||
|
func buildURL(c *cli.Context, log *zerolog.Logger) (url.URL, error) {
|
||||||
|
var err error
|
||||||
|
managementHostname := c.String("management-hostname")
|
||||||
|
token := c.String("token")
|
||||||
|
if token == "" {
|
||||||
|
token, err = getManagementToken(c, log)
|
||||||
|
if err != nil {
|
||||||
|
return url.URL{}, fmt.Errorf("unable to acquire management token for requested tunnel id: %w", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
query := url.Values{}
|
||||||
|
query.Add("access_token", token)
|
||||||
|
connector := c.String("connector-id")
|
||||||
|
if connector != "" {
|
||||||
|
connectorID, err := uuid.Parse(connector)
|
||||||
|
if err != nil {
|
||||||
|
return url.URL{}, fmt.Errorf("unabled to parse 'connector-id' flag into a valid UUID: %w", err)
|
||||||
|
}
|
||||||
|
query.Add("connector_id", connectorID.String())
|
||||||
|
}
|
||||||
|
return url.URL{Scheme: "wss", Host: managementHostname, Path: "/logs", RawQuery: query.Encode()}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func printLine(log *management.Log, logger *zerolog.Logger) {
|
||||||
|
fields, err := json.Marshal(log.Fields)
|
||||||
|
if err != nil {
|
||||||
|
fields = []byte("unable to parse fields")
|
||||||
|
logger.Debug().Msgf("unable to parse fields from event %+v", log)
|
||||||
|
}
|
||||||
|
fmt.Printf("%s %s %s %s %s\n", log.Time, log.Level, log.Event, log.Message, fields)
|
||||||
|
}
|
||||||
|
|
||||||
|
func printJSON(log *management.Log, logger *zerolog.Logger) {
|
||||||
|
output, err := json.Marshal(log)
|
||||||
|
if err != nil {
|
||||||
|
logger.Debug().Msgf("unable to parse event to json %+v", log)
|
||||||
|
} else {
|
||||||
|
fmt.Println(string(output))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Run implements a foreground runner
|
||||||
|
func Run(c *cli.Context) error {
|
||||||
|
log := createLogger(c)
|
||||||
|
|
||||||
|
signals := make(chan os.Signal, 10)
|
||||||
|
signal.Notify(signals, syscall.SIGTERM, syscall.SIGINT)
|
||||||
|
defer signal.Stop(signals)
|
||||||
|
|
||||||
|
output := "default"
|
||||||
|
switch c.String("output") {
|
||||||
|
case "default", "":
|
||||||
|
output = "default"
|
||||||
|
case "json":
|
||||||
|
output = "json"
|
||||||
|
default:
|
||||||
|
log.Err(errors.New("invalid --output value provided, please make sure it is one of: default, json")).Send()
|
||||||
|
}
|
||||||
|
|
||||||
|
filters, err := parseFilters(c)
|
||||||
|
if err != nil {
|
||||||
|
log.Error().Err(err).Msgf("invalid filters provided")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
u, err := buildURL(c, log)
|
||||||
|
if err != nil {
|
||||||
|
log.Err(err).Msg("unable to construct management request URL")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
header := make(http.Header)
|
||||||
|
header.Add("User-Agent", buildInfo.UserAgent())
|
||||||
|
trace := c.String("trace")
|
||||||
|
if trace != "" {
|
||||||
|
header["cf-trace-id"] = []string{trace}
|
||||||
|
}
|
||||||
|
ctx := c.Context
|
||||||
|
conn, resp, err := websocket.Dial(ctx, u.String(), &websocket.DialOptions{
|
||||||
|
HTTPHeader: header,
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
if resp != nil && resp.StatusCode != http.StatusSwitchingProtocols {
|
||||||
|
handleValidationError(resp, log)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
log.Error().Err(err).Msgf("unable to start management log streaming session")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
defer conn.Close(websocket.StatusInternalError, "management connection was closed abruptly")
|
||||||
|
|
||||||
|
// Once connection is established, send start_streaming event to begin receiving logs
|
||||||
|
err = management.WriteEvent(conn, ctx, &management.EventStartStreaming{
|
||||||
|
ClientEvent: management.ClientEvent{Type: management.StartStreaming},
|
||||||
|
Filters: filters,
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
log.Error().Err(err).Msg("unable to request logs from management tunnel")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
log.Debug().
|
||||||
|
Str("tunnel-id", c.Args().First()).
|
||||||
|
Str("connector-id", c.String("connector-id")).
|
||||||
|
Interface("filters", filters).
|
||||||
|
Msg("connected")
|
||||||
|
|
||||||
|
readerDone := make(chan struct{})
|
||||||
|
|
||||||
|
go func() {
|
||||||
|
defer close(readerDone)
|
||||||
|
for {
|
||||||
|
select {
|
||||||
|
case <-ctx.Done():
|
||||||
|
return
|
||||||
|
default:
|
||||||
|
event, err := management.ReadServerEvent(conn, ctx)
|
||||||
|
if err != nil {
|
||||||
|
if closeErr := management.AsClosed(err); closeErr != nil {
|
||||||
|
// If the client (or the server) already closed the connection, don't continue to
|
||||||
|
// attempt to read from the client.
|
||||||
|
if closeErr.Code == websocket.StatusNormalClosure {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
// Only log abnormal closures
|
||||||
|
log.Error().Msgf("received remote closure: (%d) %s", closeErr.Code, closeErr.Reason)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
log.Err(err).Msg("unable to read event from server")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
switch event.Type {
|
||||||
|
case management.Logs:
|
||||||
|
logs, ok := management.IntoServerEvent(event, management.Logs)
|
||||||
|
if !ok {
|
||||||
|
log.Error().Msgf("invalid logs event")
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
// Output all the logs received to stdout
|
||||||
|
for _, l := range logs.Logs {
|
||||||
|
if output == "json" {
|
||||||
|
printJSON(l, log)
|
||||||
|
} else {
|
||||||
|
printLine(l, log)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
case management.UnknownServerEventType:
|
||||||
|
fallthrough
|
||||||
|
default:
|
||||||
|
log.Debug().Msgf("unexpected log event type: %s", event.Type)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
for {
|
||||||
|
select {
|
||||||
|
case <-ctx.Done():
|
||||||
|
return nil
|
||||||
|
case <-readerDone:
|
||||||
|
return nil
|
||||||
|
case <-signals:
|
||||||
|
log.Debug().Msg("closing management connection")
|
||||||
|
// Cleanly close the connection by sending a close message and then
|
||||||
|
// waiting (with timeout) for the server to close the connection.
|
||||||
|
conn.Close(websocket.StatusNormalClosure, "")
|
||||||
|
select {
|
||||||
|
case <-readerDone:
|
||||||
|
case <-time.After(time.Second):
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -14,7 +14,7 @@ import (
|
||||||
|
|
||||||
"github.com/coreos/go-systemd/daemon"
|
"github.com/coreos/go-systemd/daemon"
|
||||||
"github.com/facebookgo/grace/gracenet"
|
"github.com/facebookgo/grace/gracenet"
|
||||||
"github.com/getsentry/raven-go"
|
"github.com/getsentry/sentry-go"
|
||||||
"github.com/google/uuid"
|
"github.com/google/uuid"
|
||||||
homedir "github.com/mitchellh/go-homedir"
|
homedir "github.com/mitchellh/go-homedir"
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
|
@ -28,19 +28,27 @@ import (
|
||||||
"github.com/cloudflare/cloudflared/cmd/cloudflared/updater"
|
"github.com/cloudflare/cloudflared/cmd/cloudflared/updater"
|
||||||
"github.com/cloudflare/cloudflared/config"
|
"github.com/cloudflare/cloudflared/config"
|
||||||
"github.com/cloudflare/cloudflared/connection"
|
"github.com/cloudflare/cloudflared/connection"
|
||||||
|
"github.com/cloudflare/cloudflared/credentials"
|
||||||
|
"github.com/cloudflare/cloudflared/edgediscovery"
|
||||||
|
"github.com/cloudflare/cloudflared/features"
|
||||||
"github.com/cloudflare/cloudflared/ingress"
|
"github.com/cloudflare/cloudflared/ingress"
|
||||||
"github.com/cloudflare/cloudflared/logger"
|
"github.com/cloudflare/cloudflared/logger"
|
||||||
|
"github.com/cloudflare/cloudflared/management"
|
||||||
"github.com/cloudflare/cloudflared/metrics"
|
"github.com/cloudflare/cloudflared/metrics"
|
||||||
"github.com/cloudflare/cloudflared/orchestration"
|
"github.com/cloudflare/cloudflared/orchestration"
|
||||||
"github.com/cloudflare/cloudflared/signal"
|
"github.com/cloudflare/cloudflared/signal"
|
||||||
"github.com/cloudflare/cloudflared/supervisor"
|
"github.com/cloudflare/cloudflared/supervisor"
|
||||||
"github.com/cloudflare/cloudflared/tlsconfig"
|
"github.com/cloudflare/cloudflared/tlsconfig"
|
||||||
"github.com/cloudflare/cloudflared/tunneldns"
|
"github.com/cloudflare/cloudflared/tunneldns"
|
||||||
|
"github.com/cloudflare/cloudflared/validation"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
sentryDSN = "https://56a9c9fa5c364ab28f34b14f35ea0f1b:3e8827f6f9f740738eb11138f7bebb68@sentry.io/189878"
|
sentryDSN = "https://56a9c9fa5c364ab28f34b14f35ea0f1b:3e8827f6f9f740738eb11138f7bebb68@sentry.io/189878"
|
||||||
|
|
||||||
|
// ha-Connections specifies how many connections to make to the edge
|
||||||
|
haConnectionsFlag = "ha-connections"
|
||||||
|
|
||||||
// sshPortFlag is the port on localhost the cloudflared ssh server will run on
|
// sshPortFlag is the port on localhost the cloudflared ssh server will run on
|
||||||
sshPortFlag = "local-ssh-port"
|
sshPortFlag = "local-ssh-port"
|
||||||
|
|
||||||
|
@ -74,14 +82,21 @@ const (
|
||||||
// uiFlag is to enable launching cloudflared in interactive UI mode
|
// uiFlag is to enable launching cloudflared in interactive UI mode
|
||||||
uiFlag = "ui"
|
uiFlag = "ui"
|
||||||
|
|
||||||
debugLevelWarning = "At debug level cloudflared will log request URL, method, protocol, content length, as well as, all request and response headers. " +
|
|
||||||
"This can expose sensitive information in your logs."
|
|
||||||
|
|
||||||
LogFieldCommand = "command"
|
LogFieldCommand = "command"
|
||||||
LogFieldExpandedPath = "expandedPath"
|
LogFieldExpandedPath = "expandedPath"
|
||||||
LogFieldPIDPathname = "pidPathname"
|
LogFieldPIDPathname = "pidPathname"
|
||||||
LogFieldTmpTraceFilename = "tmpTraceFilename"
|
LogFieldTmpTraceFilename = "tmpTraceFilename"
|
||||||
LogFieldTraceOutputFilepath = "traceOutputFilepath"
|
LogFieldTraceOutputFilepath = "traceOutputFilepath"
|
||||||
|
|
||||||
|
tunnelCmdErrorMessage = `You did not specify any valid additional argument to the cloudflared tunnel command.
|
||||||
|
|
||||||
|
If you are trying to run a Quick Tunnel then you need to explicitly pass the --url flag.
|
||||||
|
Eg. cloudflared tunnel --url localhost:8080/.
|
||||||
|
|
||||||
|
Please note that Quick Tunnels are meant to be ephemeral and should only be used for testing purposes.
|
||||||
|
For production usage, we recommend creating Named Tunnels. (https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/install-and-setup/tunnel-guide/)
|
||||||
|
`
|
||||||
|
connectorLabelFlag = "label"
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
|
@ -91,6 +106,7 @@ var (
|
||||||
routeFailMsg = fmt.Sprintf("failed to provision routing, please create it manually via Cloudflare dashboard or UI; "+
|
routeFailMsg = fmt.Sprintf("failed to provision routing, please create it manually via Cloudflare dashboard or UI; "+
|
||||||
"most likely you already have a conflicting record there. You can also rerun this command with --%s to overwrite "+
|
"most likely you already have a conflicting record there. You can also rerun this command with --%s to overwrite "+
|
||||||
"any existing DNS records for this hostname.", overwriteDNSFlag)
|
"any existing DNS records for this hostname.", overwriteDNSFlag)
|
||||||
|
deprecatedClassicTunnelErr = fmt.Errorf("Classic tunnels have been deprecated, please use Named Tunnels. (https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/install-and-setup/tunnel-guide/)")
|
||||||
)
|
)
|
||||||
|
|
||||||
func Flags() []cli.Flag {
|
func Flags() []cli.Flag {
|
||||||
|
@ -166,21 +182,54 @@ func TunnelCommand(c *cli.Context) error {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
if name := c.String("name"); name != "" { // Start a named tunnel
|
|
||||||
|
// Run a adhoc named tunnel
|
||||||
|
// Allows for the creation, routing (optional), and startup of a tunnel in one command
|
||||||
|
// --name required
|
||||||
|
// --url or --hello-world required
|
||||||
|
// --hostname optional
|
||||||
|
if name := c.String("name"); name != "" {
|
||||||
|
hostname, err := validation.ValidateHostname(c.String("hostname"))
|
||||||
|
if err != nil {
|
||||||
|
return errors.Wrap(err, "Invalid hostname provided")
|
||||||
|
}
|
||||||
|
url := c.String("url")
|
||||||
|
if url == hostname && url != "" && hostname != "" {
|
||||||
|
return fmt.Errorf("hostname and url shouldn't match. See --help for more information")
|
||||||
|
}
|
||||||
|
|
||||||
return runAdhocNamedTunnel(sc, name, c.String(CredFileFlag))
|
return runAdhocNamedTunnel(sc, name, c.String(CredFileFlag))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Run a quick tunnel
|
||||||
|
// A unauthenticated named tunnel hosted on <random>.<quick-tunnels-service>.com
|
||||||
|
// We don't support running proxy-dns and a quick tunnel at the same time as the same process
|
||||||
|
shouldRunQuickTunnel := c.IsSet("url") || c.IsSet(ingress.HelloWorldFlag)
|
||||||
|
if !c.IsSet("proxy-dns") && c.String("quick-service") != "" && shouldRunQuickTunnel {
|
||||||
|
return RunQuickTunnel(sc)
|
||||||
|
}
|
||||||
|
|
||||||
|
// If user provides a config, check to see if they meant to use `tunnel run` instead
|
||||||
if ref := config.GetConfiguration().TunnelID; ref != "" {
|
if ref := config.GetConfiguration().TunnelID; ref != "" {
|
||||||
return fmt.Errorf("Use `cloudflared tunnel run` to start tunnel %s", ref)
|
return fmt.Errorf("Use `cloudflared tunnel run` to start tunnel %s", ref)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Unauthenticated named tunnel on <random>.<quick-tunnels-service>.com
|
// Classic tunnel usage is no longer supported
|
||||||
// For now, default to legacy setup unless quick-service is specified
|
if c.String("hostname") != "" {
|
||||||
if !dnsProxyStandAlone(c, nil) && c.String("hostname") == "" && c.String("quick-service") != "" {
|
return deprecatedClassicTunnelErr
|
||||||
return RunQuickTunnel(sc)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Start a classic tunnel
|
if c.IsSet("proxy-dns") {
|
||||||
return runClassicTunnel(sc)
|
if shouldRunQuickTunnel {
|
||||||
|
return fmt.Errorf("running a quick tunnel with `proxy-dns` is not supported")
|
||||||
|
}
|
||||||
|
// NamedTunnelProperties are nil since proxy dns server does not need it.
|
||||||
|
// This is supported for legacy reasons: dns proxy server is not a tunnel and ideally should
|
||||||
|
// not run as part of cloudflared tunnel.
|
||||||
|
return StartServer(sc.c, buildInfo, nil, sc.log)
|
||||||
|
}
|
||||||
|
|
||||||
|
return errors.New(tunnelCmdErrorMessage)
|
||||||
}
|
}
|
||||||
|
|
||||||
func Init(info *cliutil.BuildInfo, gracefulShutdown chan struct{}) {
|
func Init(info *cliutil.BuildInfo, gracefulShutdown chan struct{}) {
|
||||||
|
@ -215,11 +264,6 @@ func runAdhocNamedTunnel(sc *subcommandContext, name, credentialsOutputPath stri
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// runClassicTunnel creates a "classic" non-named tunnel
|
|
||||||
func runClassicTunnel(sc *subcommandContext) error {
|
|
||||||
return StartServer(sc.c, buildInfo, nil, sc.log)
|
|
||||||
}
|
|
||||||
|
|
||||||
func routeFromFlag(c *cli.Context) (route cfapi.HostnameRoute, ok bool) {
|
func routeFromFlag(c *cli.Context) (route cfapi.HostnameRoute, ok bool) {
|
||||||
if hostname := c.String("hostname"); hostname != "" {
|
if hostname := c.String("hostname"); hostname != "" {
|
||||||
if lbPool := c.String("lb-pool"); lbPool != "" {
|
if lbPool := c.String("lb-pool"); lbPool != "" {
|
||||||
|
@ -236,12 +280,19 @@ func StartServer(
|
||||||
namedTunnel *connection.NamedTunnelProperties,
|
namedTunnel *connection.NamedTunnelProperties,
|
||||||
log *zerolog.Logger,
|
log *zerolog.Logger,
|
||||||
) error {
|
) error {
|
||||||
_ = raven.SetDSN(sentryDSN)
|
err := sentry.Init(sentry.ClientOptions{
|
||||||
|
Dsn: sentryDSN,
|
||||||
|
Release: c.App.Version,
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
var wg sync.WaitGroup
|
var wg sync.WaitGroup
|
||||||
listeners := gracenet.Net{}
|
listeners := gracenet.Net{}
|
||||||
errC := make(chan error)
|
errC := make(chan error)
|
||||||
|
|
||||||
if config.GetConfiguration().Source() == "" {
|
// Only log for locally configured tunnels (Token is blank).
|
||||||
|
if config.GetConfiguration().Source() == "" && c.String(TunnelTokenFlag) == "" {
|
||||||
log.Info().Msg(config.ErrNoConfigFile.Error())
|
log.Info().Msg(config.ErrNoConfigFile.Error())
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -314,21 +365,13 @@ func StartServer(
|
||||||
errC <- autoupdater.Run(ctx)
|
errC <- autoupdater.Run(ctx)
|
||||||
}()
|
}()
|
||||||
|
|
||||||
// Serve DNS proxy stand-alone if no hostname or tag or app is going to run
|
// Serve DNS proxy stand-alone if no tunnel type (quick, adhoc, named) is going to run
|
||||||
if dnsProxyStandAlone(c, namedTunnel) {
|
if dnsProxyStandAlone(c, namedTunnel) {
|
||||||
connectedSignal.Notify()
|
connectedSignal.Notify()
|
||||||
// no grace period, handle SIGINT/SIGTERM immediately
|
// no grace period, handle SIGINT/SIGTERM immediately
|
||||||
return waitToShutdown(&wg, cancel, errC, graceShutdownC, 0, log)
|
return waitToShutdown(&wg, cancel, errC, graceShutdownC, 0, log)
|
||||||
}
|
}
|
||||||
|
|
||||||
url := c.String("url")
|
|
||||||
hostname := c.String("hostname")
|
|
||||||
if url == hostname && url != "" && hostname != "" {
|
|
||||||
errText := "hostname and url shouldn't match. See --help for more information"
|
|
||||||
log.Error().Msg(errText)
|
|
||||||
return fmt.Errorf(errText)
|
|
||||||
}
|
|
||||||
|
|
||||||
logTransport := logger.CreateTransportLoggerFromContext(c, logger.EnableTerminalLog)
|
logTransport := logger.CreateTransportLoggerFromContext(c, logger.EnableTerminalLog)
|
||||||
|
|
||||||
observer := connection.NewObserver(log, logTransport)
|
observer := connection.NewObserver(log, logTransport)
|
||||||
|
@ -356,7 +399,26 @@ func StartServer(
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
orchestrator, err := orchestration.NewOrchestrator(ctx, orchestratorConfig, tunnelConfig.Tags, tunnelConfig.Log)
|
localRules := []ingress.Rule{}
|
||||||
|
if features.Contains(features.FeatureManagementLogs) {
|
||||||
|
serviceIP := c.String("service-op-ip")
|
||||||
|
if edgeAddrs, err := edgediscovery.ResolveEdge(log, tunnelConfig.Region, tunnelConfig.EdgeIPVersion); err == nil {
|
||||||
|
if serviceAddr, err := edgeAddrs.GetAddrForRPC(); err == nil {
|
||||||
|
serviceIP = serviceAddr.TCP.String()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
mgmt := management.New(
|
||||||
|
c.String("management-hostname"),
|
||||||
|
serviceIP,
|
||||||
|
clientID,
|
||||||
|
c.String(connectorLabelFlag),
|
||||||
|
logger.ManagementLogger.Log,
|
||||||
|
logger.ManagementLogger,
|
||||||
|
)
|
||||||
|
localRules = []ingress.Rule{ingress.NewManagementRule(mgmt)}
|
||||||
|
}
|
||||||
|
orchestrator, err := orchestration.NewOrchestrator(ctx, orchestratorConfig, tunnelConfig.Tags, localRules, tunnelConfig.Log)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
@ -372,10 +434,15 @@ func StartServer(
|
||||||
defer wg.Done()
|
defer wg.Done()
|
||||||
readinessServer := metrics.NewReadyServer(log, clientID)
|
readinessServer := metrics.NewReadyServer(log, clientID)
|
||||||
observer.RegisterSink(readinessServer)
|
observer.RegisterSink(readinessServer)
|
||||||
errC <- metrics.ServeMetrics(metricsListener, ctx.Done(), readinessServer, quickTunnelURL, orchestrator, log)
|
metricsConfig := metrics.Config{
|
||||||
|
ReadyServer: readinessServer,
|
||||||
|
QuickTunnelHostname: quickTunnelURL,
|
||||||
|
Orchestrator: orchestrator,
|
||||||
|
}
|
||||||
|
errC <- metrics.ServeMetrics(metricsListener, ctx, metricsConfig, log)
|
||||||
}()
|
}()
|
||||||
|
|
||||||
reconnectCh := make(chan supervisor.ReconnectSignal, c.Int("ha-connections"))
|
reconnectCh := make(chan supervisor.ReconnectSignal, c.Int(haConnectionsFlag))
|
||||||
if c.IsSet("stdin-control") {
|
if c.IsSet("stdin-control") {
|
||||||
log.Info().Msg("Enabling control through stdin")
|
log.Info().Msg("Enabling control through stdin")
|
||||||
go stdinControl(reconnectCh, log)
|
go stdinControl(reconnectCh, log)
|
||||||
|
@ -488,7 +555,7 @@ func addPortIfMissing(uri *url.URL, port int) string {
|
||||||
func tunnelFlags(shouldHide bool) []cli.Flag {
|
func tunnelFlags(shouldHide bool) []cli.Flag {
|
||||||
flags := configureCloudflaredFlags(shouldHide)
|
flags := configureCloudflaredFlags(shouldHide)
|
||||||
flags = append(flags, configureProxyFlags(shouldHide)...)
|
flags = append(flags, configureProxyFlags(shouldHide)...)
|
||||||
flags = append(flags, configureLoggingFlags(shouldHide)...)
|
flags = append(flags, cliutil.ConfigureLoggingFlags(shouldHide)...)
|
||||||
flags = append(flags, configureProxyDNSFlags(shouldHide)...)
|
flags = append(flags, configureProxyDNSFlags(shouldHide)...)
|
||||||
flags = append(flags, []cli.Flag{
|
flags = append(flags, []cli.Flag{
|
||||||
credentialsFileFlag,
|
credentialsFileFlag,
|
||||||
|
@ -511,11 +578,17 @@ func tunnelFlags(shouldHide bool) []cli.Flag {
|
||||||
}),
|
}),
|
||||||
altsrc.NewStringFlag(&cli.StringFlag{
|
altsrc.NewStringFlag(&cli.StringFlag{
|
||||||
Name: "edge-ip-version",
|
Name: "edge-ip-version",
|
||||||
Usage: "Cloudflare Edge ip address version to connect with. {4, 6, auto}",
|
Usage: "Cloudflare Edge IP address version to connect with. {4, 6, auto}",
|
||||||
EnvVars: []string{"TUNNEL_EDGE_IP_VERSION"},
|
EnvVars: []string{"TUNNEL_EDGE_IP_VERSION"},
|
||||||
Value: "4",
|
Value: "4",
|
||||||
Hidden: false,
|
Hidden: false,
|
||||||
}),
|
}),
|
||||||
|
altsrc.NewStringFlag(&cli.StringFlag{
|
||||||
|
Name: "edge-bind-address",
|
||||||
|
Usage: "Bind to IP address for outgoing connections to Cloudflare Edge.",
|
||||||
|
EnvVars: []string{"TUNNEL_EDGE_BIND_ADDRESS"},
|
||||||
|
Hidden: false,
|
||||||
|
}),
|
||||||
altsrc.NewStringFlag(&cli.StringFlag{
|
altsrc.NewStringFlag(&cli.StringFlag{
|
||||||
Name: tlsconfig.CaCertFlag,
|
Name: tlsconfig.CaCertFlag,
|
||||||
Usage: "Certificate Authority authenticating connections with Cloudflare's edge network.",
|
Usage: "Certificate Authority authenticating connections with Cloudflare's edge network.",
|
||||||
|
@ -591,6 +664,12 @@ func tunnelFlags(shouldHide bool) []cli.Flag {
|
||||||
Value: 5,
|
Value: 5,
|
||||||
Hidden: true,
|
Hidden: true,
|
||||||
}),
|
}),
|
||||||
|
altsrc.NewIntFlag(&cli.IntFlag{
|
||||||
|
Name: "max-edge-addr-retries",
|
||||||
|
Usage: "Maximum number of times to retry on edge addrs before falling back to a lower protocol",
|
||||||
|
Value: 8,
|
||||||
|
Hidden: true,
|
||||||
|
}),
|
||||||
// Note TUN-3758 , we use Int because UInt is not supported with altsrc
|
// Note TUN-3758 , we use Int because UInt is not supported with altsrc
|
||||||
altsrc.NewIntFlag(&cli.IntFlag{
|
altsrc.NewIntFlag(&cli.IntFlag{
|
||||||
Name: "retries",
|
Name: "retries",
|
||||||
|
@ -600,10 +679,15 @@ func tunnelFlags(shouldHide bool) []cli.Flag {
|
||||||
Hidden: shouldHide,
|
Hidden: shouldHide,
|
||||||
}),
|
}),
|
||||||
altsrc.NewIntFlag(&cli.IntFlag{
|
altsrc.NewIntFlag(&cli.IntFlag{
|
||||||
Name: "ha-connections",
|
Name: haConnectionsFlag,
|
||||||
Value: 4,
|
Value: 4,
|
||||||
Hidden: true,
|
Hidden: true,
|
||||||
}),
|
}),
|
||||||
|
altsrc.NewStringFlag(&cli.StringFlag{
|
||||||
|
Name: connectorLabelFlag,
|
||||||
|
Usage: "Use this option to give a meaningful label to a specific connector. When a tunnel starts up, a connector id unique to the tunnel is generated. This is a uuid. To make it easier to identify a connector, we will use the hostname of the machine the tunnel is running on along with the connector ID. This option exists if one wants to have more control over what their individual connectors are called.",
|
||||||
|
Value: "",
|
||||||
|
}),
|
||||||
altsrc.NewDurationFlag(&cli.DurationFlag{
|
altsrc.NewDurationFlag(&cli.DurationFlag{
|
||||||
Name: "grace-period",
|
Name: "grace-period",
|
||||||
Usage: "When cloudflared receives SIGINT/SIGTERM it will stop accepting new requests, wait for in-progress requests to terminate, then shutdown. Waiting for in-progress requests will timeout after this grace period, or when a second SIGTERM/SIGINT is received.",
|
Usage: "When cloudflared receives SIGINT/SIGTERM it will stop accepting new requests, wait for in-progress requests to terminate, then shutdown. Waiting for in-progress requests will timeout after this grace period, or when a second SIGTERM/SIGINT is received.",
|
||||||
|
@ -689,10 +773,10 @@ func configureCloudflaredFlags(shouldHide bool) []cli.Flag {
|
||||||
Hidden: shouldHide,
|
Hidden: shouldHide,
|
||||||
},
|
},
|
||||||
altsrc.NewStringFlag(&cli.StringFlag{
|
altsrc.NewStringFlag(&cli.StringFlag{
|
||||||
Name: "origincert",
|
Name: credentials.OriginCertFlag,
|
||||||
Usage: "Path to the certificate generated for your origin when you run cloudflared login.",
|
Usage: "Path to the certificate generated for your origin when you run cloudflared login.",
|
||||||
EnvVars: []string{"TUNNEL_ORIGIN_CERT"},
|
EnvVars: []string{"TUNNEL_ORIGIN_CERT"},
|
||||||
Value: findDefaultOriginCertPath(),
|
Value: credentials.FindDefaultOriginCertPath(),
|
||||||
Hidden: shouldHide,
|
Hidden: shouldHide,
|
||||||
}),
|
}),
|
||||||
altsrc.NewDurationFlag(&cli.DurationFlag{
|
altsrc.NewDurationFlag(&cli.DurationFlag{
|
||||||
|
@ -734,7 +818,7 @@ func configureProxyFlags(shouldHide bool) []cli.Flag {
|
||||||
Hidden: shouldHide,
|
Hidden: shouldHide,
|
||||||
}),
|
}),
|
||||||
altsrc.NewBoolFlag(&cli.BoolFlag{
|
altsrc.NewBoolFlag(&cli.BoolFlag{
|
||||||
Name: "hello-world",
|
Name: ingress.HelloWorldFlag,
|
||||||
Value: false,
|
Value: false,
|
||||||
Usage: "Run Hello World Server",
|
Usage: "Run Hello World Server",
|
||||||
EnvVars: []string{"TUNNEL_HELLO_WORLD"},
|
EnvVars: []string{"TUNNEL_HELLO_WORLD"},
|
||||||
|
@ -837,6 +921,20 @@ func configureProxyFlags(shouldHide bool) []cli.Flag {
|
||||||
Hidden: shouldHide,
|
Hidden: shouldHide,
|
||||||
Value: false,
|
Value: false,
|
||||||
}),
|
}),
|
||||||
|
altsrc.NewStringFlag(&cli.StringFlag{
|
||||||
|
Name: "management-hostname",
|
||||||
|
Usage: "Management hostname to signify incoming management requests",
|
||||||
|
EnvVars: []string{"TUNNEL_MANAGEMENT_HOSTNAME"},
|
||||||
|
Hidden: true,
|
||||||
|
Value: "management.argotunnel.com",
|
||||||
|
}),
|
||||||
|
altsrc.NewStringFlag(&cli.StringFlag{
|
||||||
|
Name: "service-op-ip",
|
||||||
|
Usage: "Fallback IP for service operations run by the management service.",
|
||||||
|
EnvVars: []string{"TUNNEL_SERVICE_OP_IP"},
|
||||||
|
Hidden: true,
|
||||||
|
Value: "198.41.200.113:80",
|
||||||
|
}),
|
||||||
}
|
}
|
||||||
return append(flags, sshFlags(shouldHide)...)
|
return append(flags, sshFlags(shouldHide)...)
|
||||||
}
|
}
|
||||||
|
@ -945,44 +1043,6 @@ func sshFlags(shouldHide bool) []cli.Flag {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func configureLoggingFlags(shouldHide bool) []cli.Flag {
|
|
||||||
return []cli.Flag{
|
|
||||||
altsrc.NewStringFlag(&cli.StringFlag{
|
|
||||||
Name: logger.LogLevelFlag,
|
|
||||||
Value: "info",
|
|
||||||
Usage: "Application logging level {debug, info, warn, error, fatal}. " + debugLevelWarning,
|
|
||||||
EnvVars: []string{"TUNNEL_LOGLEVEL"},
|
|
||||||
Hidden: shouldHide,
|
|
||||||
}),
|
|
||||||
altsrc.NewStringFlag(&cli.StringFlag{
|
|
||||||
Name: logger.LogTransportLevelFlag,
|
|
||||||
Aliases: []string{"proto-loglevel"}, // This flag used to be called proto-loglevel
|
|
||||||
Value: "info",
|
|
||||||
Usage: "Transport logging level(previously called protocol logging level) {debug, info, warn, error, fatal}",
|
|
||||||
EnvVars: []string{"TUNNEL_PROTO_LOGLEVEL", "TUNNEL_TRANSPORT_LOGLEVEL"},
|
|
||||||
Hidden: shouldHide,
|
|
||||||
}),
|
|
||||||
altsrc.NewStringFlag(&cli.StringFlag{
|
|
||||||
Name: logger.LogFileFlag,
|
|
||||||
Usage: "Save application log to this file for reporting issues.",
|
|
||||||
EnvVars: []string{"TUNNEL_LOGFILE"},
|
|
||||||
Hidden: shouldHide,
|
|
||||||
}),
|
|
||||||
altsrc.NewStringFlag(&cli.StringFlag{
|
|
||||||
Name: logger.LogDirectoryFlag,
|
|
||||||
Usage: "Save application log to this directory for reporting issues.",
|
|
||||||
EnvVars: []string{"TUNNEL_LOGDIRECTORY"},
|
|
||||||
Hidden: shouldHide,
|
|
||||||
}),
|
|
||||||
altsrc.NewStringFlag(&cli.StringFlag{
|
|
||||||
Name: "trace-output",
|
|
||||||
Usage: "Name of trace output file, generated when cloudflared stops.",
|
|
||||||
EnvVars: []string{"TUNNEL_TRACE_OUTPUT"},
|
|
||||||
Hidden: shouldHide,
|
|
||||||
}),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func configureProxyDNSFlags(shouldHide bool) []cli.Flag {
|
func configureProxyDNSFlags(shouldHide bool) []cli.Flag {
|
||||||
return []cli.Flag{
|
return []cli.Flag{
|
||||||
altsrc.NewBoolFlag(&cli.BoolFlag{
|
altsrc.NewBoolFlag(&cli.BoolFlag{
|
||||||
|
|
|
@ -3,17 +3,14 @@ package tunnel
|
||||||
import (
|
import (
|
||||||
"crypto/tls"
|
"crypto/tls"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io/ioutil"
|
|
||||||
mathRand "math/rand"
|
mathRand "math/rand"
|
||||||
"net"
|
"net"
|
||||||
"net/netip"
|
"net/netip"
|
||||||
"os"
|
"os"
|
||||||
"path/filepath"
|
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/google/uuid"
|
"github.com/google/uuid"
|
||||||
homedir "github.com/mitchellh/go-homedir"
|
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
"github.com/rs/zerolog"
|
"github.com/rs/zerolog"
|
||||||
"github.com/urfave/cli/v2"
|
"github.com/urfave/cli/v2"
|
||||||
|
@ -21,21 +18,18 @@ import (
|
||||||
"golang.org/x/crypto/ssh/terminal"
|
"golang.org/x/crypto/ssh/terminal"
|
||||||
|
|
||||||
"github.com/cloudflare/cloudflared/cmd/cloudflared/cliutil"
|
"github.com/cloudflare/cloudflared/cmd/cloudflared/cliutil"
|
||||||
"github.com/cloudflare/cloudflared/edgediscovery/allregions"
|
|
||||||
|
|
||||||
"github.com/cloudflare/cloudflared/config"
|
"github.com/cloudflare/cloudflared/config"
|
||||||
"github.com/cloudflare/cloudflared/connection"
|
"github.com/cloudflare/cloudflared/connection"
|
||||||
"github.com/cloudflare/cloudflared/edgediscovery"
|
"github.com/cloudflare/cloudflared/edgediscovery"
|
||||||
"github.com/cloudflare/cloudflared/h2mux"
|
"github.com/cloudflare/cloudflared/edgediscovery/allregions"
|
||||||
|
"github.com/cloudflare/cloudflared/features"
|
||||||
"github.com/cloudflare/cloudflared/ingress"
|
"github.com/cloudflare/cloudflared/ingress"
|
||||||
"github.com/cloudflare/cloudflared/orchestration"
|
"github.com/cloudflare/cloudflared/orchestration"
|
||||||
"github.com/cloudflare/cloudflared/supervisor"
|
"github.com/cloudflare/cloudflared/supervisor"
|
||||||
"github.com/cloudflare/cloudflared/tlsconfig"
|
"github.com/cloudflare/cloudflared/tlsconfig"
|
||||||
tunnelpogs "github.com/cloudflare/cloudflared/tunnelrpc/pogs"
|
tunnelpogs "github.com/cloudflare/cloudflared/tunnelrpc/pogs"
|
||||||
"github.com/cloudflare/cloudflared/validation"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const LogFieldOriginCertPath = "originCertPath"
|
|
||||||
const secretValue = "*****"
|
const secretValue = "*****"
|
||||||
|
|
||||||
var (
|
var (
|
||||||
|
@ -43,26 +37,11 @@ var (
|
||||||
serviceUrl = developerPortal + "/reference/service/"
|
serviceUrl = developerPortal + "/reference/service/"
|
||||||
argumentsUrl = developerPortal + "/reference/arguments/"
|
argumentsUrl = developerPortal + "/reference/arguments/"
|
||||||
|
|
||||||
LogFieldHostname = "hostname"
|
secretFlags = [2]*altsrc.StringFlag{credentialsContentsFlag, tunnelTokenFlag}
|
||||||
|
|
||||||
secretFlags = [2]*altsrc.StringFlag{credentialsContentsFlag, tunnelTokenFlag}
|
configFlags = []string{"autoupdate-freq", "no-autoupdate", "retries", "protocol", "loglevel", "transport-loglevel", "origincert", "metrics", "metrics-update-freq", "edge-ip-version", "edge-bind-address"}
|
||||||
defaultFeatures = []string{supervisor.FeatureAllowRemoteConfig, supervisor.FeatureSerializedHeaders, supervisor.FeatureDatagramV2, supervisor.FeatureQUICSupportEOF}
|
|
||||||
|
|
||||||
configFlags = []string{"autoupdate-freq", "no-autoupdate", "retries", "protocol", "loglevel", "transport-loglevel", "origincert", "metrics", "metrics-update-freq", "edge-ip-version"}
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// returns the first path that contains a cert.pem file. If none of the DefaultConfigSearchDirectories
|
|
||||||
// contains a cert.pem file, return empty string
|
|
||||||
func findDefaultOriginCertPath() string {
|
|
||||||
for _, defaultConfigDir := range config.DefaultConfigSearchDirectories() {
|
|
||||||
originCertPath, _ := homedir.Expand(filepath.Join(defaultConfigDir, config.DefaultCredentialFile))
|
|
||||||
if ok, _ := config.FileExists(originCertPath); ok {
|
|
||||||
return originCertPath
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return ""
|
|
||||||
}
|
|
||||||
|
|
||||||
func generateRandomClientID(log *zerolog.Logger) (string, error) {
|
func generateRandomClientID(log *zerolog.Logger) (string, error) {
|
||||||
u, err := uuid.NewRandom()
|
u, err := uuid.NewRandom()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -127,63 +106,10 @@ func isSecretEnvVar(key string) bool {
|
||||||
}
|
}
|
||||||
|
|
||||||
func dnsProxyStandAlone(c *cli.Context, namedTunnel *connection.NamedTunnelProperties) bool {
|
func dnsProxyStandAlone(c *cli.Context, namedTunnel *connection.NamedTunnelProperties) bool {
|
||||||
return c.IsSet("proxy-dns") && (!c.IsSet("hostname") && !c.IsSet("tag") && !c.IsSet("hello-world") && namedTunnel == nil)
|
return c.IsSet("proxy-dns") &&
|
||||||
}
|
!(c.IsSet("name") || // adhoc-named tunnel
|
||||||
|
c.IsSet(ingress.HelloWorldFlag) || // quick or named tunnel
|
||||||
func findOriginCert(originCertPath string, log *zerolog.Logger) (string, error) {
|
namedTunnel != nil) // named tunnel
|
||||||
if originCertPath == "" {
|
|
||||||
log.Info().Msgf("Cannot determine default origin certificate path. No file %s in %v", config.DefaultCredentialFile, config.DefaultConfigSearchDirectories())
|
|
||||||
if isRunningFromTerminal() {
|
|
||||||
log.Error().Msgf("You need to specify the origin certificate path with --origincert option, or set TUNNEL_ORIGIN_CERT environment variable. See %s for more information.", argumentsUrl)
|
|
||||||
return "", fmt.Errorf("client didn't specify origincert path when running from terminal")
|
|
||||||
} else {
|
|
||||||
log.Error().Msgf("You need to specify the origin certificate path by specifying the origincert option in the configuration file, or set TUNNEL_ORIGIN_CERT environment variable. See %s for more information.", serviceUrl)
|
|
||||||
return "", fmt.Errorf("client didn't specify origincert path")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
var err error
|
|
||||||
originCertPath, err = homedir.Expand(originCertPath)
|
|
||||||
if err != nil {
|
|
||||||
log.Err(err).Msgf("Cannot resolve origin certificate path")
|
|
||||||
return "", fmt.Errorf("cannot resolve path %s", originCertPath)
|
|
||||||
}
|
|
||||||
// Check that the user has acquired a certificate using the login command
|
|
||||||
ok, err := config.FileExists(originCertPath)
|
|
||||||
if err != nil {
|
|
||||||
log.Error().Err(err).Msgf("Cannot check if origin cert exists at path %s", originCertPath)
|
|
||||||
return "", fmt.Errorf("cannot check if origin cert exists at path %s", originCertPath)
|
|
||||||
}
|
|
||||||
if !ok {
|
|
||||||
log.Error().Msgf(`Cannot find a valid certificate for your origin at the path:
|
|
||||||
|
|
||||||
%s
|
|
||||||
|
|
||||||
If the path above is wrong, specify the path with the -origincert option.
|
|
||||||
If you don't have a certificate signed by Cloudflare, run the command:
|
|
||||||
|
|
||||||
%s login
|
|
||||||
`, originCertPath, os.Args[0])
|
|
||||||
return "", fmt.Errorf("cannot find a valid certificate at the path %s", originCertPath)
|
|
||||||
}
|
|
||||||
|
|
||||||
return originCertPath, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func readOriginCert(originCertPath string) ([]byte, error) {
|
|
||||||
// Easier to send the certificate as []byte via RPC than decoding it at this point
|
|
||||||
originCert, err := ioutil.ReadFile(originCertPath)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("cannot read %s to load origin certificate", originCertPath)
|
|
||||||
}
|
|
||||||
return originCert, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func getOriginCert(originCertPath string, log *zerolog.Logger) ([]byte, error) {
|
|
||||||
if originCertPath, err := findOriginCert(originCertPath, log); err != nil {
|
|
||||||
return nil, err
|
|
||||||
} else {
|
|
||||||
return readOriginCert(originCertPath)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func prepareTunnelConfig(
|
func prepareTunnelConfig(
|
||||||
|
@ -193,37 +119,19 @@ func prepareTunnelConfig(
|
||||||
observer *connection.Observer,
|
observer *connection.Observer,
|
||||||
namedTunnel *connection.NamedTunnelProperties,
|
namedTunnel *connection.NamedTunnelProperties,
|
||||||
) (*supervisor.TunnelConfig, *orchestration.Config, error) {
|
) (*supervisor.TunnelConfig, *orchestration.Config, error) {
|
||||||
isNamedTunnel := namedTunnel != nil
|
clientID, err := uuid.NewRandom()
|
||||||
|
|
||||||
configHostname := c.String("hostname")
|
|
||||||
hostname, err := validation.ValidateHostname(configHostname)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Err(err).Str(LogFieldHostname, configHostname).Msg("Invalid hostname")
|
return nil, nil, errors.Wrap(err, "can't generate connector UUID")
|
||||||
return nil, nil, errors.Wrap(err, "Invalid hostname")
|
|
||||||
}
|
}
|
||||||
clientID := c.String("id")
|
log.Info().Msgf("Generated Connector ID: %s", clientID)
|
||||||
if !c.IsSet("id") {
|
|
||||||
clientID, err = generateRandomClientID(log)
|
|
||||||
if err != nil {
|
|
||||||
return nil, nil, err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
tags, err := NewTagSliceFromCLI(c.StringSlice("tag"))
|
tags, err := NewTagSliceFromCLI(c.StringSlice("tag"))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Err(err).Msg("Tag parse failure")
|
log.Err(err).Msg("Tag parse failure")
|
||||||
return nil, nil, errors.Wrap(err, "Tag parse failure")
|
return nil, nil, errors.Wrap(err, "Tag parse failure")
|
||||||
}
|
}
|
||||||
|
tags = append(tags, tunnelpogs.Tag{Name: "ID", Value: clientID.String()})
|
||||||
tags = append(tags, tunnelpogs.Tag{Name: "ID", Value: clientID})
|
|
||||||
|
|
||||||
var (
|
|
||||||
ingressRules ingress.Ingress
|
|
||||||
classicTunnel *connection.ClassicTunnelProperties
|
|
||||||
)
|
|
||||||
|
|
||||||
transportProtocol := c.String("protocol")
|
transportProtocol := c.String("protocol")
|
||||||
|
|
||||||
needPQ := c.Bool("post-quantum")
|
needPQ := c.Bool("post-quantum")
|
||||||
if needPQ {
|
if needPQ {
|
||||||
if FipsEnabled {
|
if FipsEnabled {
|
||||||
|
@ -236,81 +144,23 @@ func prepareTunnelConfig(
|
||||||
transportProtocol = connection.QUIC.String()
|
transportProtocol = connection.QUIC.String()
|
||||||
}
|
}
|
||||||
|
|
||||||
protocolFetcher := edgediscovery.ProtocolPercentage
|
clientFeatures := dedup(append(c.StringSlice("features"), features.DefaultFeatures...))
|
||||||
|
if needPQ {
|
||||||
|
clientFeatures = append(clientFeatures, features.FeaturePostQuantum)
|
||||||
|
}
|
||||||
|
namedTunnel.Client = tunnelpogs.ClientInfo{
|
||||||
|
ClientID: clientID[:],
|
||||||
|
Features: clientFeatures,
|
||||||
|
Version: info.Version(),
|
||||||
|
Arch: info.OSArch(),
|
||||||
|
}
|
||||||
cfg := config.GetConfiguration()
|
cfg := config.GetConfiguration()
|
||||||
if isNamedTunnel {
|
ingressRules, err := ingress.ParseIngressFromConfigAndCLI(cfg, c, log)
|
||||||
clientUUID, err := uuid.NewRandom()
|
if err != nil {
|
||||||
if err != nil {
|
return nil, nil, err
|
||||||
return nil, nil, errors.Wrap(err, "can't generate connector UUID")
|
|
||||||
}
|
|
||||||
log.Info().Msgf("Generated Connector ID: %s", clientUUID)
|
|
||||||
features := append(c.StringSlice("features"), defaultFeatures...)
|
|
||||||
if needPQ {
|
|
||||||
features = append(features, supervisor.FeaturePostQuantum)
|
|
||||||
}
|
|
||||||
if c.IsSet(TunnelTokenFlag) {
|
|
||||||
if transportProtocol == connection.AutoSelectFlag {
|
|
||||||
protocolFetcher = func() (edgediscovery.ProtocolPercents, error) {
|
|
||||||
// If the Tunnel is remotely managed and no protocol is set, we prefer QUIC, but still allow fall-back.
|
|
||||||
preferQuic := []edgediscovery.ProtocolPercent{
|
|
||||||
{
|
|
||||||
Protocol: connection.QUIC.String(),
|
|
||||||
Percentage: 100,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
Protocol: connection.HTTP2.String(),
|
|
||||||
Percentage: 100,
|
|
||||||
},
|
|
||||||
}
|
|
||||||
return preferQuic, nil
|
|
||||||
}
|
|
||||||
}
|
|
||||||
log.Info().Msg("Will be fetching remotely managed configuration from Cloudflare API. Defaulting to protocol: quic")
|
|
||||||
}
|
|
||||||
namedTunnel.Client = tunnelpogs.ClientInfo{
|
|
||||||
ClientID: clientUUID[:],
|
|
||||||
Features: dedup(features),
|
|
||||||
Version: info.Version(),
|
|
||||||
Arch: info.OSArch(),
|
|
||||||
}
|
|
||||||
ingressRules, err = ingress.ParseIngress(cfg)
|
|
||||||
if err != nil && err != ingress.ErrNoIngressRules {
|
|
||||||
return nil, nil, err
|
|
||||||
}
|
|
||||||
if !ingressRules.IsEmpty() && c.IsSet("url") {
|
|
||||||
return nil, nil, ingress.ErrURLIncompatibleWithIngress
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
|
|
||||||
originCertPath := c.String("origincert")
|
|
||||||
originCertLog := log.With().
|
|
||||||
Str(LogFieldOriginCertPath, originCertPath).
|
|
||||||
Logger()
|
|
||||||
|
|
||||||
originCert, err := getOriginCert(originCertPath, &originCertLog)
|
|
||||||
if err != nil {
|
|
||||||
return nil, nil, errors.Wrap(err, "Error getting origin cert")
|
|
||||||
}
|
|
||||||
|
|
||||||
classicTunnel = &connection.ClassicTunnelProperties{
|
|
||||||
Hostname: hostname,
|
|
||||||
OriginCert: originCert,
|
|
||||||
// turn off use of reconnect token and auth refresh when using named tunnels
|
|
||||||
UseReconnectToken: !isNamedTunnel && c.Bool("use-reconnect-token"),
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Convert single-origin configuration into multi-origin configuration.
|
protocolSelector, err := connection.NewProtocolSelector(transportProtocol, namedTunnel.Credentials.AccountTag, c.IsSet(TunnelTokenFlag), c.Bool("post-quantum"), edgediscovery.ProtocolPercentage, connection.ResolveTTL, log)
|
||||||
if ingressRules.IsEmpty() {
|
|
||||||
ingressRules, err = ingress.NewSingleOrigin(c, !isNamedTunnel)
|
|
||||||
if err != nil {
|
|
||||||
return nil, nil, err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
warpRoutingEnabled := isWarpRoutingEnabled(cfg.WarpRouting, isNamedTunnel)
|
|
||||||
protocolSelector, err := connection.NewProtocolSelector(transportProtocol, warpRoutingEnabled, namedTunnel, protocolFetcher, supervisor.ResolveTTL, log, c.Bool("post-quantum"))
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, nil, err
|
return nil, nil, err
|
||||||
}
|
}
|
||||||
|
@ -336,18 +186,22 @@ func prepareTunnelConfig(
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, nil, err
|
return nil, nil, err
|
||||||
}
|
}
|
||||||
muxerConfig := &connection.MuxerConfig{
|
|
||||||
HeartbeatInterval: c.Duration("heartbeat-interval"),
|
|
||||||
// Note TUN-3758 , we use Int because UInt is not supported with altsrc
|
|
||||||
MaxHeartbeats: uint64(c.Int("heartbeat-count")),
|
|
||||||
// Note TUN-3758 , we use Int because UInt is not supported with altsrc
|
|
||||||
CompressionSetting: h2mux.CompressionSetting(uint64(c.Int("compression-quality"))),
|
|
||||||
MetricsUpdateFreq: c.Duration("metrics-update-freq"),
|
|
||||||
}
|
|
||||||
edgeIPVersion, err := parseConfigIPVersion(c.String("edge-ip-version"))
|
edgeIPVersion, err := parseConfigIPVersion(c.String("edge-ip-version"))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, nil, err
|
return nil, nil, err
|
||||||
}
|
}
|
||||||
|
edgeBindAddr, err := parseConfigBindAddress(c.String("edge-bind-address"))
|
||||||
|
if err != nil {
|
||||||
|
return nil, nil, err
|
||||||
|
}
|
||||||
|
if err := testIPBindable(edgeBindAddr); err != nil {
|
||||||
|
return nil, nil, fmt.Errorf("invalid edge-bind-address %s: %v", edgeBindAddr, err)
|
||||||
|
}
|
||||||
|
edgeIPVersion, err = adjustIPVersionByBindAddress(edgeIPVersion, edgeBindAddr)
|
||||||
|
if err != nil {
|
||||||
|
// This is not a fatal error, we just overrode edgeIPVersion
|
||||||
|
log.Warn().Str("edgeIPVersion", edgeIPVersion.String()).Err(err).Msg("Overriding edge-ip-version")
|
||||||
|
}
|
||||||
|
|
||||||
var pqKexIdx int
|
var pqKexIdx int
|
||||||
if needPQ {
|
if needPQ {
|
||||||
|
@ -362,11 +216,12 @@ func prepareTunnelConfig(
|
||||||
GracePeriod: gracePeriod,
|
GracePeriod: gracePeriod,
|
||||||
ReplaceExisting: c.Bool("force"),
|
ReplaceExisting: c.Bool("force"),
|
||||||
OSArch: info.OSArch(),
|
OSArch: info.OSArch(),
|
||||||
ClientID: clientID,
|
ClientID: clientID.String(),
|
||||||
EdgeAddrs: c.StringSlice("edge"),
|
EdgeAddrs: c.StringSlice("edge"),
|
||||||
Region: c.String("region"),
|
Region: c.String("region"),
|
||||||
EdgeIPVersion: edgeIPVersion,
|
EdgeIPVersion: edgeIPVersion,
|
||||||
HAConnections: c.Int("ha-connections"),
|
EdgeBindAddr: edgeBindAddr,
|
||||||
|
HAConnections: c.Int(haConnectionsFlag),
|
||||||
IncidentLookup: supervisor.NewIncidentLookup(),
|
IncidentLookup: supervisor.NewIncidentLookup(),
|
||||||
IsAutoupdated: c.Bool("is-autoupdated"),
|
IsAutoupdated: c.Bool("is-autoupdated"),
|
||||||
LBPool: c.String("lb-pool"),
|
LBPool: c.String("lb-pool"),
|
||||||
|
@ -376,15 +231,14 @@ func prepareTunnelConfig(
|
||||||
Observer: observer,
|
Observer: observer,
|
||||||
ReportedVersion: info.Version(),
|
ReportedVersion: info.Version(),
|
||||||
// Note TUN-3758 , we use Int because UInt is not supported with altsrc
|
// Note TUN-3758 , we use Int because UInt is not supported with altsrc
|
||||||
Retries: uint(c.Int("retries")),
|
Retries: uint(c.Int("retries")),
|
||||||
RunFromTerminal: isRunningFromTerminal(),
|
RunFromTerminal: isRunningFromTerminal(),
|
||||||
NamedTunnel: namedTunnel,
|
NamedTunnel: namedTunnel,
|
||||||
ClassicTunnel: classicTunnel,
|
ProtocolSelector: protocolSelector,
|
||||||
MuxerConfig: muxerConfig,
|
EdgeTLSConfigs: edgeTLSConfigs,
|
||||||
ProtocolSelector: protocolSelector,
|
NeedPQ: needPQ,
|
||||||
EdgeTLSConfigs: edgeTLSConfigs,
|
PQKexIdx: pqKexIdx,
|
||||||
NeedPQ: needPQ,
|
MaxEdgeAddrRetries: uint8(c.Int("max-edge-addr-retries")),
|
||||||
PQKexIdx: pqKexIdx,
|
|
||||||
}
|
}
|
||||||
packetConfig, err := newPacketConfig(c, log)
|
packetConfig, err := newPacketConfig(c, log)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -420,10 +274,6 @@ func gracePeriod(c *cli.Context) (time.Duration, error) {
|
||||||
return period, nil
|
return period, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func isWarpRoutingEnabled(warpConfig config.WarpRoutingConfig, isNamedTunnel bool) bool {
|
|
||||||
return warpConfig.Enabled && isNamedTunnel
|
|
||||||
}
|
|
||||||
|
|
||||||
func isRunningFromTerminal() bool {
|
func isRunningFromTerminal() bool {
|
||||||
return terminal.IsTerminal(int(os.Stdout.Fd()))
|
return terminal.IsTerminal(int(os.Stdout.Fd()))
|
||||||
}
|
}
|
||||||
|
@ -462,6 +312,51 @@ func parseConfigIPVersion(version string) (v allregions.ConfigIPVersion, err err
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func parseConfigBindAddress(ipstr string) (net.IP, error) {
|
||||||
|
// Unspecified - it's fine
|
||||||
|
if ipstr == "" {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
ip := net.ParseIP(ipstr)
|
||||||
|
if ip == nil {
|
||||||
|
return nil, fmt.Errorf("invalid value for edge-bind-address: %s", ipstr)
|
||||||
|
}
|
||||||
|
return ip, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func testIPBindable(ip net.IP) error {
|
||||||
|
// "Unspecified" = let OS choose, so always bindable
|
||||||
|
if ip == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
addr := &net.UDPAddr{IP: ip, Port: 0}
|
||||||
|
listener, err := net.ListenUDP("udp", addr)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
listener.Close()
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func adjustIPVersionByBindAddress(ipVersion allregions.ConfigIPVersion, ip net.IP) (allregions.ConfigIPVersion, error) {
|
||||||
|
if ip == nil {
|
||||||
|
return ipVersion, nil
|
||||||
|
}
|
||||||
|
// https://pkg.go.dev/net#IP.To4: "If ip is not an IPv4 address, To4 returns nil."
|
||||||
|
if ip.To4() != nil {
|
||||||
|
if ipVersion == allregions.IPv6Only {
|
||||||
|
return allregions.IPv4Only, fmt.Errorf("IPv4 bind address is specified, but edge-ip-version is IPv6")
|
||||||
|
}
|
||||||
|
return allregions.IPv4Only, nil
|
||||||
|
} else {
|
||||||
|
if ipVersion == allregions.IPv4Only {
|
||||||
|
return allregions.IPv6Only, fmt.Errorf("IPv6 bind address is specified, but edge-ip-version is IPv4")
|
||||||
|
}
|
||||||
|
return allregions.IPv6Only, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func newPacketConfig(c *cli.Context, logger *zerolog.Logger) (*ingress.GlobalRouterConfig, error) {
|
func newPacketConfig(c *cli.Context, logger *zerolog.Logger) (*ingress.GlobalRouterConfig, error) {
|
||||||
ipv4Src, err := determineICMPv4Src(c.String("icmpv4-src"), logger)
|
ipv4Src, err := determineICMPv4Src(c.String("icmpv4-src"), logger)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -9,6 +9,7 @@ import (
|
||||||
"crypto/x509"
|
"crypto/x509"
|
||||||
"crypto/x509/pkix"
|
"crypto/x509/pkix"
|
||||||
"encoding/asn1"
|
"encoding/asn1"
|
||||||
|
"net"
|
||||||
"os"
|
"os"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
@ -214,3 +215,23 @@ func getCertPoolSubjects(certPool *x509.CertPool) ([]*pkix.Name, error) {
|
||||||
func isUnrecoverableError(err error) bool {
|
func isUnrecoverableError(err error) bool {
|
||||||
return err != nil && err.Error() != "crypto/x509: system root pool is not available on Windows"
|
return err != nil && err.Error() != "crypto/x509: system root pool is not available on Windows"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestTestIPBindable(t *testing.T) {
|
||||||
|
assert.Nil(t, testIPBindable(nil))
|
||||||
|
|
||||||
|
// Public services - if one of these IPs is on the machine, the test environment is too weird
|
||||||
|
assert.NotNil(t, testIPBindable(net.ParseIP("8.8.8.8")))
|
||||||
|
assert.NotNil(t, testIPBindable(net.ParseIP("1.1.1.1")))
|
||||||
|
|
||||||
|
addrs, err := net.InterfaceAddrs()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
for i, addr := range addrs {
|
||||||
|
if i >= 3 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
ip := addr.(*net.IPNet).IP
|
||||||
|
assert.Nil(t, testIPBindable(ip))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
|
@ -5,6 +5,7 @@ import (
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
|
|
||||||
"github.com/cloudflare/cloudflared/config"
|
"github.com/cloudflare/cloudflared/config"
|
||||||
|
"github.com/cloudflare/cloudflared/credentials"
|
||||||
|
|
||||||
"github.com/google/uuid"
|
"github.com/google/uuid"
|
||||||
"github.com/rs/zerolog"
|
"github.com/rs/zerolog"
|
||||||
|
@ -56,13 +57,13 @@ func newSearchByID(id uuid.UUID, c *cli.Context, log *zerolog.Logger, fs fileSys
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s searchByID) Path() (string, error) {
|
func (s searchByID) Path() (string, error) {
|
||||||
originCertPath := s.c.String("origincert")
|
originCertPath := s.c.String(credentials.OriginCertFlag)
|
||||||
originCertLog := s.log.With().
|
originCertLog := s.log.With().
|
||||||
Str(LogFieldOriginCertPath, originCertPath).
|
Str("originCertPath", originCertPath).
|
||||||
Logger()
|
Logger()
|
||||||
|
|
||||||
// Fallback to look for tunnel credentials in the origin cert directory
|
// Fallback to look for tunnel credentials in the origin cert directory
|
||||||
if originCertPath, err := findOriginCert(originCertPath, &originCertLog); err == nil {
|
if originCertPath, err := credentials.FindOriginCert(originCertPath, &originCertLog); err == nil {
|
||||||
originCertDir := filepath.Dir(originCertPath)
|
originCertDir := filepath.Dir(originCertPath)
|
||||||
if filePath, err := tunnelFilePath(s.id, originCertDir); err == nil {
|
if filePath, err := tunnelFilePath(s.id, originCertDir); err == nil {
|
||||||
if s.fs.validFilePath(filePath) {
|
if s.fs.validFilePath(filePath) {
|
||||||
|
|
|
@ -14,6 +14,7 @@ import (
|
||||||
|
|
||||||
"github.com/cloudflare/cloudflared/cmd/cloudflared/cliutil"
|
"github.com/cloudflare/cloudflared/cmd/cloudflared/cliutil"
|
||||||
"github.com/cloudflare/cloudflared/config"
|
"github.com/cloudflare/cloudflared/config"
|
||||||
|
"github.com/cloudflare/cloudflared/credentials"
|
||||||
"github.com/cloudflare/cloudflared/logger"
|
"github.com/cloudflare/cloudflared/logger"
|
||||||
"github.com/cloudflare/cloudflared/token"
|
"github.com/cloudflare/cloudflared/token"
|
||||||
)
|
)
|
||||||
|
@ -52,6 +53,7 @@ func login(c *cli.Context) error {
|
||||||
|
|
||||||
resourceData, err := token.RunTransfer(
|
resourceData, err := token.RunTransfer(
|
||||||
loginURL,
|
loginURL,
|
||||||
|
"",
|
||||||
"cert",
|
"cert",
|
||||||
"callback",
|
"callback",
|
||||||
callbackStoreURL,
|
callbackStoreURL,
|
||||||
|
@ -85,7 +87,7 @@ func checkForExistingCert() (string, bool, error) {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", false, err
|
return "", false, err
|
||||||
}
|
}
|
||||||
path := filepath.Join(configPath, config.DefaultCredentialFile)
|
path := filepath.Join(configPath, credentials.DefaultCredentialFile)
|
||||||
fileInfo, err := os.Stat(path)
|
fileInfo, err := os.Stat(path)
|
||||||
if err == nil && fileInfo.Size() > 0 {
|
if err == nil && fileInfo.Size() > 0 {
|
||||||
return path, true, nil
|
return path, true, nil
|
||||||
|
|
|
@ -73,6 +73,9 @@ func RunQuickTunnel(sc *subcommandContext) error {
|
||||||
sc.c.Set("protocol", "quic")
|
sc.c.Set("protocol", "quic")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Override the number of connections used. Quick tunnels shouldn't be used for production usage,
|
||||||
|
// so, use a single connection instead.
|
||||||
|
sc.c.Set(haConnectionsFlag, "1")
|
||||||
return StartServer(
|
return StartServer(
|
||||||
sc.c,
|
sc.c,
|
||||||
buildInfo,
|
buildInfo,
|
||||||
|
|
|
@ -13,9 +13,9 @@ import (
|
||||||
"github.com/rs/zerolog"
|
"github.com/rs/zerolog"
|
||||||
"github.com/urfave/cli/v2"
|
"github.com/urfave/cli/v2"
|
||||||
|
|
||||||
"github.com/cloudflare/cloudflared/certutil"
|
|
||||||
"github.com/cloudflare/cloudflared/cfapi"
|
"github.com/cloudflare/cloudflared/cfapi"
|
||||||
"github.com/cloudflare/cloudflared/connection"
|
"github.com/cloudflare/cloudflared/connection"
|
||||||
|
"github.com/cloudflare/cloudflared/credentials"
|
||||||
"github.com/cloudflare/cloudflared/logger"
|
"github.com/cloudflare/cloudflared/logger"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -37,7 +37,7 @@ type subcommandContext struct {
|
||||||
|
|
||||||
// These fields should be accessed using their respective Getter
|
// These fields should be accessed using their respective Getter
|
||||||
tunnelstoreClient cfapi.Client
|
tunnelstoreClient cfapi.Client
|
||||||
userCredential *userCredential
|
userCredential *credentials.User
|
||||||
}
|
}
|
||||||
|
|
||||||
func newSubcommandContext(c *cli.Context) (*subcommandContext, error) {
|
func newSubcommandContext(c *cli.Context) (*subcommandContext, error) {
|
||||||
|
@ -56,65 +56,28 @@ func (sc *subcommandContext) credentialFinder(tunnelID uuid.UUID) CredFinder {
|
||||||
return newSearchByID(tunnelID, sc.c, sc.log, sc.fs)
|
return newSearchByID(tunnelID, sc.c, sc.log, sc.fs)
|
||||||
}
|
}
|
||||||
|
|
||||||
type userCredential struct {
|
|
||||||
cert *certutil.OriginCert
|
|
||||||
certPath string
|
|
||||||
}
|
|
||||||
|
|
||||||
func (sc *subcommandContext) client() (cfapi.Client, error) {
|
func (sc *subcommandContext) client() (cfapi.Client, error) {
|
||||||
if sc.tunnelstoreClient != nil {
|
if sc.tunnelstoreClient != nil {
|
||||||
return sc.tunnelstoreClient, nil
|
return sc.tunnelstoreClient, nil
|
||||||
}
|
}
|
||||||
credential, err := sc.credential()
|
cred, err := sc.credential()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
userAgent := fmt.Sprintf("cloudflared/%s", buildInfo.Version())
|
sc.tunnelstoreClient, err = cred.Client(sc.c.String("api-url"), buildInfo.UserAgent(), sc.log)
|
||||||
client, err := cfapi.NewRESTClient(
|
|
||||||
sc.c.String("api-url"),
|
|
||||||
credential.cert.AccountID,
|
|
||||||
credential.cert.ZoneID,
|
|
||||||
credential.cert.ServiceKey,
|
|
||||||
userAgent,
|
|
||||||
sc.log,
|
|
||||||
)
|
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
sc.tunnelstoreClient = client
|
return sc.tunnelstoreClient, nil
|
||||||
return client, nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (sc *subcommandContext) credential() (*userCredential, error) {
|
func (sc *subcommandContext) credential() (*credentials.User, error) {
|
||||||
if sc.userCredential == nil {
|
if sc.userCredential == nil {
|
||||||
originCertPath := sc.c.String("origincert")
|
uc, err := credentials.Read(sc.c.String(credentials.OriginCertFlag), sc.log)
|
||||||
originCertLog := sc.log.With().
|
|
||||||
Str(LogFieldOriginCertPath, originCertPath).
|
|
||||||
Logger()
|
|
||||||
|
|
||||||
originCertPath, err := findOriginCert(originCertPath, &originCertLog)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, errors.Wrap(err, "Error locating origin cert")
|
return nil, err
|
||||||
}
|
|
||||||
blocks, err := readOriginCert(originCertPath)
|
|
||||||
if err != nil {
|
|
||||||
return nil, errors.Wrapf(err, "Can't read origin cert from %s", originCertPath)
|
|
||||||
}
|
|
||||||
|
|
||||||
cert, err := certutil.DecodeOriginCert(blocks)
|
|
||||||
if err != nil {
|
|
||||||
return nil, errors.Wrap(err, "Error decoding origin cert")
|
|
||||||
}
|
|
||||||
|
|
||||||
if cert.AccountID == "" {
|
|
||||||
return nil, errors.Errorf(`Origin certificate needs to be refreshed before creating new tunnels.\nDelete %s and run "cloudflared login" to obtain a new cert.`, originCertPath)
|
|
||||||
}
|
|
||||||
|
|
||||||
sc.userCredential = &userCredential{
|
|
||||||
cert: cert,
|
|
||||||
certPath: originCertPath,
|
|
||||||
}
|
}
|
||||||
|
sc.userCredential = uc
|
||||||
}
|
}
|
||||||
return sc.userCredential, nil
|
return sc.userCredential, nil
|
||||||
}
|
}
|
||||||
|
@ -175,13 +138,13 @@ func (sc *subcommandContext) create(name string, credentialsFilePath string, sec
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
tunnelCredentials := connection.Credentials{
|
tunnelCredentials := connection.Credentials{
|
||||||
AccountTag: credential.cert.AccountID,
|
AccountTag: credential.AccountID(),
|
||||||
TunnelSecret: tunnelSecret,
|
TunnelSecret: tunnelSecret,
|
||||||
TunnelID: tunnel.ID,
|
TunnelID: tunnel.ID,
|
||||||
}
|
}
|
||||||
usedCertPath := false
|
usedCertPath := false
|
||||||
if credentialsFilePath == "" {
|
if credentialsFilePath == "" {
|
||||||
originCertDir := filepath.Dir(credential.certPath)
|
originCertDir := filepath.Dir(credential.CertPath())
|
||||||
credentialsFilePath, err = tunnelFilePath(tunnelCredentials.TunnelID, originCertDir)
|
credentialsFilePath, err = tunnelFilePath(tunnelCredentials.TunnelID, originCertDir)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
|
|
@ -16,6 +16,7 @@ import (
|
||||||
|
|
||||||
"github.com/cloudflare/cloudflared/cfapi"
|
"github.com/cloudflare/cloudflared/cfapi"
|
||||||
"github.com/cloudflare/cloudflared/connection"
|
"github.com/cloudflare/cloudflared/connection"
|
||||||
|
"github.com/cloudflare/cloudflared/credentials"
|
||||||
)
|
)
|
||||||
|
|
||||||
type mockFileSystem struct {
|
type mockFileSystem struct {
|
||||||
|
@ -37,7 +38,7 @@ func Test_subcommandContext_findCredentials(t *testing.T) {
|
||||||
log *zerolog.Logger
|
log *zerolog.Logger
|
||||||
fs fileSystem
|
fs fileSystem
|
||||||
tunnelstoreClient cfapi.Client
|
tunnelstoreClient cfapi.Client
|
||||||
userCredential *userCredential
|
userCredential *credentials.User
|
||||||
}
|
}
|
||||||
type args struct {
|
type args struct {
|
||||||
tunnelID uuid.UUID
|
tunnelID uuid.UUID
|
||||||
|
@ -249,7 +250,7 @@ func Test_subcommandContext_Delete(t *testing.T) {
|
||||||
isUIEnabled bool
|
isUIEnabled bool
|
||||||
fs fileSystem
|
fs fileSystem
|
||||||
tunnelstoreClient *deleteMockTunnelStore
|
tunnelstoreClient *deleteMockTunnelStore
|
||||||
userCredential *userCredential
|
userCredential *credentials.User
|
||||||
}
|
}
|
||||||
type args struct {
|
type args struct {
|
||||||
tunnelIDs []uuid.UUID
|
tunnelIDs []uuid.UUID
|
||||||
|
|
|
@ -23,12 +23,12 @@ func (sc *subcommandContext) listVirtualNetworks(filter *cfapi.VnetFilter) ([]*c
|
||||||
return client.ListVirtualNetworks(filter)
|
return client.ListVirtualNetworks(filter)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (sc *subcommandContext) deleteVirtualNetwork(vnetId uuid.UUID) error {
|
func (sc *subcommandContext) deleteVirtualNetwork(vnetId uuid.UUID, force bool) error {
|
||||||
client, err := sc.client()
|
client, err := sc.client()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errors.Wrap(err, noClientMsg)
|
return errors.Wrap(err, noClientMsg)
|
||||||
}
|
}
|
||||||
return client.DeleteVirtualNetwork(vnetId)
|
return client.DeleteVirtualNetwork(vnetId, force)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (sc *subcommandContext) updateVirtualNetwork(vnetId uuid.UUID, updates cfapi.UpdateVirtualNetwork) error {
|
func (sc *subcommandContext) updateVirtualNetwork(vnetId uuid.UUID, updates cfapi.UpdateVirtualNetwork) error {
|
||||||
|
|
|
@ -95,14 +95,6 @@ var (
|
||||||
Usage: "Inverts the sort order of the tunnel list.",
|
Usage: "Inverts the sort order of the tunnel list.",
|
||||||
EnvVars: []string{"TUNNEL_LIST_INVERT_SORT"},
|
EnvVars: []string{"TUNNEL_LIST_INVERT_SORT"},
|
||||||
}
|
}
|
||||||
forceFlag = altsrc.NewBoolFlag(&cli.BoolFlag{
|
|
||||||
Name: "force",
|
|
||||||
Aliases: []string{"f"},
|
|
||||||
Usage: "By default, if a tunnel is currently being run from a cloudflared, you can't " +
|
|
||||||
"simultaneously rerun it again from a second cloudflared. The --force flag lets you " +
|
|
||||||
"overwrite the previous tunnel. If you want to use a single hostname with multiple " +
|
|
||||||
"tunnels, you can do so with Cloudflare's Load Balancer product.",
|
|
||||||
})
|
|
||||||
featuresFlag = altsrc.NewStringSliceFlag(&cli.StringSliceFlag{
|
featuresFlag = altsrc.NewStringSliceFlag(&cli.StringSliceFlag{
|
||||||
Name: "features",
|
Name: "features",
|
||||||
Aliases: []string{"F"},
|
Aliases: []string{"F"},
|
||||||
|
@ -616,7 +608,6 @@ func renderOutput(format string, v interface{}) error {
|
||||||
|
|
||||||
func buildRunCommand() *cli.Command {
|
func buildRunCommand() *cli.Command {
|
||||||
flags := []cli.Flag{
|
flags := []cli.Flag{
|
||||||
forceFlag,
|
|
||||||
credentialsFileFlag,
|
credentialsFileFlag,
|
||||||
credentialsContentsFlag,
|
credentialsContentsFlag,
|
||||||
postQuantumFlag,
|
postQuantumFlag,
|
||||||
|
@ -632,7 +623,7 @@ func buildRunCommand() *cli.Command {
|
||||||
Action: cliutil.ConfiguredAction(runCommand),
|
Action: cliutil.ConfiguredAction(runCommand),
|
||||||
Usage: "Proxy a local web server by running the given tunnel",
|
Usage: "Proxy a local web server by running the given tunnel",
|
||||||
UsageText: "cloudflared tunnel [tunnel command options] run [subcommand options] [TUNNEL]",
|
UsageText: "cloudflared tunnel [tunnel command options] run [subcommand options] [TUNNEL]",
|
||||||
Description: `Runs the tunnel identified by name or UUUD, creating highly available connections
|
Description: `Runs the tunnel identified by name or UUID, creating highly available connections
|
||||||
between your server and the Cloudflare edge. You can provide name or UUID of tunnel to run either as the
|
between your server and the Cloudflare edge. You can provide name or UUID of tunnel to run either as the
|
||||||
last command line argument or in the configuration file using "tunnel: TUNNEL".
|
last command line argument or in the configuration file using "tunnel: TUNNEL".
|
||||||
|
|
||||||
|
@ -783,7 +774,7 @@ func tokenCommand(c *cli.Context) error {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
fmt.Printf("%s", encodedToken)
|
fmt.Println(encodedToken)
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -821,7 +812,7 @@ Further information about managing Cloudflare WARP traffic to your tunnel is ava
|
||||||
Name: "lb",
|
Name: "lb",
|
||||||
Action: cliutil.ConfiguredAction(routeLbCommand),
|
Action: cliutil.ConfiguredAction(routeLbCommand),
|
||||||
Usage: "Use this tunnel as a load balancer origin, creating pool and load balancer if necessary",
|
Usage: "Use this tunnel as a load balancer origin, creating pool and load balancer if necessary",
|
||||||
UsageText: "cloudflared tunnel route lb [TUNNEL] [HOSTNAME] [LB-POOL]",
|
UsageText: "cloudflared tunnel route lb [TUNNEL] [HOSTNAME] [LB-POOL-NAME]",
|
||||||
Description: `Creates Load Balancer with an origin pool that points to the tunnel.`,
|
Description: `Creates Load Balancer with an origin pool that points to the tunnel.`,
|
||||||
},
|
},
|
||||||
buildRouteIPSubcommand(),
|
buildRouteIPSubcommand(),
|
||||||
|
@ -941,7 +932,7 @@ func commandHelpTemplate() string {
|
||||||
for _, f := range configureCloudflaredFlags(false) {
|
for _, f := range configureCloudflaredFlags(false) {
|
||||||
parentFlagsHelp += fmt.Sprintf(" %s\n\t", f)
|
parentFlagsHelp += fmt.Sprintf(" %s\n\t", f)
|
||||||
}
|
}
|
||||||
for _, f := range configureLoggingFlags(false) {
|
for _, f := range cliutil.ConfigureLoggingFlags(false) {
|
||||||
parentFlagsHelp += fmt.Sprintf(" %s\n\t", f)
|
parentFlagsHelp += fmt.Sprintf(" %s\n\t", f)
|
||||||
}
|
}
|
||||||
const template = `NAME:
|
const template = `NAME:
|
||||||
|
|
|
@ -33,6 +33,12 @@ var (
|
||||||
Aliases: []string{"c"},
|
Aliases: []string{"c"},
|
||||||
Usage: "A new comment describing the purpose of the virtual network.",
|
Usage: "A new comment describing the purpose of the virtual network.",
|
||||||
}
|
}
|
||||||
|
vnetForceDeleteFlag = &cli.BoolFlag{
|
||||||
|
Name: "force",
|
||||||
|
Aliases: []string{"f"},
|
||||||
|
Usage: "Force the deletion of the virtual network even if it is being relied upon by other resources. Those" +
|
||||||
|
"resources will either be deleted (e.g. IP Routes) or moved to the current default virutal network.",
|
||||||
|
}
|
||||||
)
|
)
|
||||||
|
|
||||||
func buildVirtualNetworkSubcommand(hidden bool) *cli.Command {
|
func buildVirtualNetworkSubcommand(hidden bool) *cli.Command {
|
||||||
|
@ -82,6 +88,7 @@ be the current default.`,
|
||||||
UsageText: "cloudflared tunnel [--config FILEPATH] network delete VIRTUAL_NETWORK",
|
UsageText: "cloudflared tunnel [--config FILEPATH] network delete VIRTUAL_NETWORK",
|
||||||
Description: `Deletes the virtual network (given its ID or name). This is only possible if that virtual network is unused.
|
Description: `Deletes the virtual network (given its ID or name). This is only possible if that virtual network is unused.
|
||||||
A virtual network may be used by IP routes or by WARP devices.`,
|
A virtual network may be used by IP routes or by WARP devices.`,
|
||||||
|
Flags: []cli.Flag{vnetForceDeleteFlag},
|
||||||
Hidden: hidden,
|
Hidden: hidden,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -188,7 +195,7 @@ func deleteVirtualNetworkCommand(c *cli.Context) error {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
if c.NArg() != 1 {
|
if c.NArg() < 1 {
|
||||||
return errors.New("You must supply exactly one argument, either the ID or name of the virtual network to delete")
|
return errors.New("You must supply exactly one argument, either the ID or name of the virtual network to delete")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -198,7 +205,12 @@ func deleteVirtualNetworkCommand(c *cli.Context) error {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := sc.deleteVirtualNetwork(vnetId); err != nil {
|
forceDelete := false
|
||||||
|
if c.IsSet(vnetForceDeleteFlag.Name) {
|
||||||
|
forceDelete = c.Bool(vnetForceDeleteFlag.Name)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := sc.deleteVirtualNetwork(vnetId, forceDelete); err != nil {
|
||||||
return errors.Wrap(err, "API error")
|
return errors.Wrap(err, "API error")
|
||||||
}
|
}
|
||||||
fmt.Printf("Successfully deleted virtual network '%s'\n", input)
|
fmt.Printf("Successfully deleted virtual network '%s'\n", input)
|
||||||
|
|
|
@ -6,6 +6,7 @@ import (
|
||||||
"os"
|
"os"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
"runtime"
|
"runtime"
|
||||||
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/facebookgo/grace/gracenet"
|
"github.com/facebookgo/grace/gracenet"
|
||||||
|
@ -95,11 +96,24 @@ func CheckForUpdate(options updateOptions) (CheckResult, error) {
|
||||||
url = StagingUpdateURL
|
url = StagingUpdateURL
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if runtime.GOOS == "windows" {
|
||||||
|
cfdPath = encodeWindowsPath(cfdPath)
|
||||||
|
}
|
||||||
|
|
||||||
s := NewWorkersService(version, url, cfdPath, Options{IsBeta: options.isBeta,
|
s := NewWorkersService(version, url, cfdPath, Options{IsBeta: options.isBeta,
|
||||||
IsForced: options.isForced, RequestedVersion: options.intendedVersion})
|
IsForced: options.isForced, RequestedVersion: options.intendedVersion})
|
||||||
|
|
||||||
return s.Check()
|
return s.Check()
|
||||||
}
|
}
|
||||||
|
func encodeWindowsPath(path string) string {
|
||||||
|
// We do this because Windows allows spaces in directories such as
|
||||||
|
// Program Files but does not allow these directories to be spaced in batch files.
|
||||||
|
targetPath := strings.Replace(path, "Program Files (x86)", "PROGRA~2", -1)
|
||||||
|
// This is to do the same in 32 bit systems. We do this second so that the first
|
||||||
|
// replace is for x86 dirs.
|
||||||
|
targetPath = strings.Replace(targetPath, "Program Files", "PROGRA~1", -1)
|
||||||
|
return targetPath
|
||||||
|
}
|
||||||
|
|
||||||
func applyUpdate(options updateOptions, update CheckResult) UpdateOutcome {
|
func applyUpdate(options updateOptions, update CheckResult) UpdateOutcome {
|
||||||
if update.Version() == "" || options.updateDisabled {
|
if update.Version() == "" || options.updateDisabled {
|
||||||
|
|
|
@ -25,14 +25,13 @@ const (
|
||||||
// rename cloudflared.exe.new to cloudflared.exe
|
// rename cloudflared.exe.new to cloudflared.exe
|
||||||
// delete cloudflared.exe.old
|
// delete cloudflared.exe.old
|
||||||
// start the service
|
// start the service
|
||||||
// delete the batch file
|
// exit with code 0 if we've reached this point indicating success.
|
||||||
windowsUpdateCommandTemplate = `@echo off
|
windowsUpdateCommandTemplate = `sc stop cloudflared >nul 2>&1
|
||||||
sc stop cloudflared >nul 2>&1
|
|
||||||
rename "{{.TargetPath}}" {{.OldName}}
|
rename "{{.TargetPath}}" {{.OldName}}
|
||||||
rename "{{.NewPath}}" {{.BinaryName}}
|
rename "{{.NewPath}}" {{.BinaryName}}
|
||||||
del "{{.OldPath}}"
|
del "{{.OldPath}}"
|
||||||
sc start cloudflared >nul 2>&1
|
sc start cloudflared >nul 2>&1
|
||||||
del {{.BatchName}}`
|
exit /b 0`
|
||||||
batchFileName = "cfd_update.bat"
|
batchFileName = "cfd_update.bat"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -214,8 +213,9 @@ func isValidChecksum(checksum, filePath string) error {
|
||||||
// writeBatchFile writes a batch file out to disk
|
// writeBatchFile writes a batch file out to disk
|
||||||
// see the dicussion on why it has to be done this way
|
// see the dicussion on why it has to be done this way
|
||||||
func writeBatchFile(targetPath string, newPath string, oldPath string) error {
|
func writeBatchFile(targetPath string, newPath string, oldPath string) error {
|
||||||
os.Remove(batchFileName) //remove any failed updates before download
|
batchFilePath := filepath.Join(filepath.Dir(targetPath), batchFileName)
|
||||||
f, err := os.Create(batchFileName)
|
os.Remove(batchFilePath) //remove any failed updates before download
|
||||||
|
f, err := os.Create(batchFilePath)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
@ -241,6 +241,16 @@ func writeBatchFile(targetPath string, newPath string, oldPath string) error {
|
||||||
|
|
||||||
// run each OS command for windows
|
// run each OS command for windows
|
||||||
func runWindowsBatch(batchFile string) error {
|
func runWindowsBatch(batchFile string) error {
|
||||||
cmd := exec.Command("cmd", "/c", batchFile)
|
defer os.Remove(batchFile)
|
||||||
return cmd.Start()
|
cmd := exec.Command("cmd", "/C", batchFile)
|
||||||
|
_, err := cmd.Output()
|
||||||
|
// Remove the batch file we created. Don't let this interfere with the error
|
||||||
|
// we report.
|
||||||
|
if err != nil {
|
||||||
|
if exitError, ok := err.(*exec.ExitError); ok {
|
||||||
|
return fmt.Errorf("Error during update : %s;", string(exitError.Stderr))
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
return err
|
||||||
}
|
}
|
||||||
|
|
|
@ -10,7 +10,6 @@
|
||||||
cloudflared_binary: "cloudflared"
|
cloudflared_binary: "cloudflared"
|
||||||
tunnel: "3d539f97-cd3a-4d8e-c33b-65e9099c7a8d"
|
tunnel: "3d539f97-cd3a-4d8e-c33b-65e9099c7a8d"
|
||||||
credentials_file: "/Users/tunnel/.cloudflared/3d539f97-cd3a-4d8e-c33b-65e9099c7a8d.json"
|
credentials_file: "/Users/tunnel/.cloudflared/3d539f97-cd3a-4d8e-c33b-65e9099c7a8d.json"
|
||||||
classic_hostname: "classic-tunnel-component-tests.example.com"
|
|
||||||
origincert: "/Users/tunnel/.cloudflared/cert.pem"
|
origincert: "/Users/tunnel/.cloudflared/cert.pem"
|
||||||
ingress:
|
ingress:
|
||||||
- hostname: named-tunnel-component-tests.example.com
|
- hostname: named-tunnel-component-tests.example.com
|
||||||
|
|
|
@ -2,7 +2,9 @@ import json
|
||||||
import subprocess
|
import subprocess
|
||||||
from time import sleep
|
from time import sleep
|
||||||
|
|
||||||
|
from constants import MANAGEMENT_HOST_NAME
|
||||||
from setup import get_config_from_file
|
from setup import get_config_from_file
|
||||||
|
from util import get_tunnel_connector_id
|
||||||
|
|
||||||
SINGLE_CASE_TIMEOUT = 600
|
SINGLE_CASE_TIMEOUT = 600
|
||||||
|
|
||||||
|
@ -28,6 +30,36 @@ class CloudflaredCli:
|
||||||
listed = self._run_command(cmd_args, "list")
|
listed = self._run_command(cmd_args, "list")
|
||||||
return json.loads(listed.stdout)
|
return json.loads(listed.stdout)
|
||||||
|
|
||||||
|
def get_management_token(self, config, config_path):
|
||||||
|
basecmd = [config.cloudflared_binary]
|
||||||
|
if config_path is not None:
|
||||||
|
basecmd += ["--config", str(config_path)]
|
||||||
|
origincert = get_config_from_file()["origincert"]
|
||||||
|
if origincert:
|
||||||
|
basecmd += ["--origincert", origincert]
|
||||||
|
|
||||||
|
cmd_args = ["tail", "token", config.get_tunnel_id()]
|
||||||
|
cmd = basecmd + cmd_args
|
||||||
|
result = run_subprocess(cmd, "token", self.logger, check=True, capture_output=True, timeout=15)
|
||||||
|
return json.loads(result.stdout.decode("utf-8").strip())["token"]
|
||||||
|
|
||||||
|
def get_management_url(self, path, config, config_path):
|
||||||
|
access_jwt = self.get_management_token(config, config_path)
|
||||||
|
connector_id = get_tunnel_connector_id()
|
||||||
|
return f"https://{MANAGEMENT_HOST_NAME}/{path}?connector_id={connector_id}&access_token={access_jwt}"
|
||||||
|
|
||||||
|
def get_management_wsurl(self, path, config, config_path):
|
||||||
|
access_jwt = self.get_management_token(config, config_path)
|
||||||
|
connector_id = get_tunnel_connector_id()
|
||||||
|
return f"wss://{MANAGEMENT_HOST_NAME}/{path}?connector_id={connector_id}&access_token={access_jwt}"
|
||||||
|
|
||||||
|
def get_connector_id(self, config):
|
||||||
|
op = self.get_tunnel_info(config.get_tunnel_id())
|
||||||
|
connectors = []
|
||||||
|
for conn in op["conns"]:
|
||||||
|
connectors.append(conn["id"])
|
||||||
|
return connectors
|
||||||
|
|
||||||
def get_tunnel_info(self, tunnel_id):
|
def get_tunnel_info(self, tunnel_id):
|
||||||
info = self._run_command(["info", "--output", "json", tunnel_id], "info")
|
info = self._run_command(["info", "--output", "json", tunnel_id], "info")
|
||||||
return json.loads(info.stdout)
|
return json.loads(info.stdout)
|
||||||
|
|
|
@ -30,6 +30,7 @@ class NamedTunnelBaseConfig(BaseConfig):
|
||||||
tunnel: str = None
|
tunnel: str = None
|
||||||
credentials_file: str = None
|
credentials_file: str = None
|
||||||
ingress: list = None
|
ingress: list = None
|
||||||
|
hostname: str = None
|
||||||
|
|
||||||
def __post_init__(self):
|
def __post_init__(self):
|
||||||
if self.tunnel is None:
|
if self.tunnel is None:
|
||||||
|
@ -41,8 +42,10 @@ class NamedTunnelBaseConfig(BaseConfig):
|
||||||
|
|
||||||
def merge_config(self, additional):
|
def merge_config(self, additional):
|
||||||
config = super(NamedTunnelBaseConfig, self).merge_config(additional)
|
config = super(NamedTunnelBaseConfig, self).merge_config(additional)
|
||||||
config['tunnel'] = self.tunnel
|
if 'tunnel' not in config:
|
||||||
config['credentials-file'] = self.credentials_file
|
config['tunnel'] = self.tunnel
|
||||||
|
if 'credentials-file' not in config:
|
||||||
|
config['credentials-file'] = self.credentials_file
|
||||||
# In some cases we want to override default ingress, such as in config tests
|
# In some cases we want to override default ingress, such as in config tests
|
||||||
if 'ingress' not in config:
|
if 'ingress' not in config:
|
||||||
config['ingress'] = self.ingress
|
config['ingress'] = self.ingress
|
||||||
|
@ -61,7 +64,7 @@ class NamedTunnelConfig(NamedTunnelBaseConfig):
|
||||||
self.merge_config(additional_config))
|
self.merge_config(additional_config))
|
||||||
|
|
||||||
def get_url(self):
|
def get_url(self):
|
||||||
return "https://" + self.ingress[0]['hostname']
|
return "https://" + self.hostname
|
||||||
|
|
||||||
def base_config(self):
|
def base_config(self):
|
||||||
config = self.full_config.copy()
|
config = self.full_config.copy()
|
||||||
|
@ -84,28 +87,9 @@ class NamedTunnelConfig(NamedTunnelBaseConfig):
|
||||||
def get_credentials_json(self):
|
def get_credentials_json(self):
|
||||||
with open(self.credentials_file) as json_file:
|
with open(self.credentials_file) as json_file:
|
||||||
return json.load(json_file)
|
return json.load(json_file)
|
||||||
|
|
||||||
|
|
||||||
@dataclass(frozen=True)
|
@dataclass(frozen=True)
|
||||||
class ClassicTunnelBaseConfig(BaseConfig):
|
class QuickTunnelConfig(BaseConfig):
|
||||||
hostname: str = None
|
|
||||||
origincert: str = None
|
|
||||||
|
|
||||||
def __post_init__(self):
|
|
||||||
if self.hostname is None:
|
|
||||||
raise TypeError("Field tunnel is not set")
|
|
||||||
if self.origincert is None:
|
|
||||||
raise TypeError("Field credentials_file is not set")
|
|
||||||
|
|
||||||
def merge_config(self, additional):
|
|
||||||
config = super(ClassicTunnelBaseConfig, self).merge_config(additional)
|
|
||||||
config['hostname'] = self.hostname
|
|
||||||
config['origincert'] = self.origincert
|
|
||||||
return config
|
|
||||||
|
|
||||||
|
|
||||||
@dataclass(frozen=True)
|
|
||||||
class ClassicTunnelConfig(ClassicTunnelBaseConfig):
|
|
||||||
full_config: dict = None
|
full_config: dict = None
|
||||||
additional_config: InitVar[dict] = {}
|
additional_config: InitVar[dict] = {}
|
||||||
|
|
||||||
|
@ -115,10 +99,6 @@ class ClassicTunnelConfig(ClassicTunnelBaseConfig):
|
||||||
object.__setattr__(self, 'full_config',
|
object.__setattr__(self, 'full_config',
|
||||||
self.merge_config(additional_config))
|
self.merge_config(additional_config))
|
||||||
|
|
||||||
def get_url(self):
|
|
||||||
return "https://" + self.hostname
|
|
||||||
|
|
||||||
|
|
||||||
@dataclass(frozen=True)
|
@dataclass(frozen=True)
|
||||||
class ProxyDnsConfig(BaseConfig):
|
class ProxyDnsConfig(BaseConfig):
|
||||||
full_config = {
|
full_config = {
|
||||||
|
|
|
@ -0,0 +1,8 @@
|
||||||
|
cloudflared_binary: "cloudflared"
|
||||||
|
tunnel: "ae21a96c-24d1-4ce8-a6ba-962cba5976d3"
|
||||||
|
credentials_file: "/Users/sudarsan/.cloudflared/ae21a96c-24d1-4ce8-a6ba-962cba5976d3.json"
|
||||||
|
origincert: "/Users/sudarsan/.cloudflared/cert.pem"
|
||||||
|
ingress:
|
||||||
|
- hostname: named-tunnel-component-tests.example.com
|
||||||
|
service: hello_world
|
||||||
|
- service: http_status:404
|
|
@ -5,14 +5,14 @@ from time import sleep
|
||||||
import pytest
|
import pytest
|
||||||
import yaml
|
import yaml
|
||||||
|
|
||||||
from config import NamedTunnelConfig, ClassicTunnelConfig, ProxyDnsConfig
|
from config import NamedTunnelConfig, ProxyDnsConfig, QuickTunnelConfig
|
||||||
from constants import BACKOFF_SECS, PROXY_DNS_PORT
|
from constants import BACKOFF_SECS, PROXY_DNS_PORT
|
||||||
from util import LOGGER
|
from util import LOGGER
|
||||||
|
|
||||||
|
|
||||||
class CfdModes(Enum):
|
class CfdModes(Enum):
|
||||||
NAMED = auto()
|
NAMED = auto()
|
||||||
CLASSIC = auto()
|
QUICK = auto()
|
||||||
PROXY_DNS = auto()
|
PROXY_DNS = auto()
|
||||||
|
|
||||||
|
|
||||||
|
@ -26,7 +26,7 @@ def component_tests_config():
|
||||||
config = yaml.safe_load(stream)
|
config = yaml.safe_load(stream)
|
||||||
LOGGER.info(f"component tests base config {config}")
|
LOGGER.info(f"component tests base config {config}")
|
||||||
|
|
||||||
def _component_tests_config(additional_config={}, cfd_mode=CfdModes.NAMED, run_proxy_dns=True):
|
def _component_tests_config(additional_config={}, cfd_mode=CfdModes.NAMED, run_proxy_dns=True, provide_ingress=True):
|
||||||
if run_proxy_dns:
|
if run_proxy_dns:
|
||||||
# Regression test for TUN-4177, running with proxy-dns should not prevent tunnels from running.
|
# Regression test for TUN-4177, running with proxy-dns should not prevent tunnels from running.
|
||||||
# So we run all tests with it.
|
# So we run all tests with it.
|
||||||
|
@ -36,18 +36,25 @@ def component_tests_config():
|
||||||
additional_config.pop("proxy-dns", None)
|
additional_config.pop("proxy-dns", None)
|
||||||
additional_config.pop("proxy-dns-port", None)
|
additional_config.pop("proxy-dns-port", None)
|
||||||
|
|
||||||
|
# Allows the ingress rules to be omitted from the provided config
|
||||||
|
ingress = []
|
||||||
|
if provide_ingress:
|
||||||
|
ingress = config['ingress']
|
||||||
|
|
||||||
|
# Provide the hostname to allow routing to the tunnel even if the ingress rule isn't defined in the config
|
||||||
|
hostname = config['ingress'][0]['hostname']
|
||||||
|
|
||||||
if cfd_mode is CfdModes.NAMED:
|
if cfd_mode is CfdModes.NAMED:
|
||||||
return NamedTunnelConfig(additional_config=additional_config,
|
return NamedTunnelConfig(additional_config=additional_config,
|
||||||
cloudflared_binary=config['cloudflared_binary'],
|
cloudflared_binary=config['cloudflared_binary'],
|
||||||
tunnel=config['tunnel'],
|
tunnel=config['tunnel'],
|
||||||
credentials_file=config['credentials_file'],
|
credentials_file=config['credentials_file'],
|
||||||
ingress=config['ingress'])
|
ingress=ingress,
|
||||||
elif cfd_mode is CfdModes.CLASSIC:
|
hostname=hostname)
|
||||||
return ClassicTunnelConfig(
|
|
||||||
additional_config=additional_config, cloudflared_binary=config['cloudflared_binary'],
|
|
||||||
hostname=config['classic_hostname'], origincert=config['origincert'])
|
|
||||||
elif cfd_mode is CfdModes.PROXY_DNS:
|
elif cfd_mode is CfdModes.PROXY_DNS:
|
||||||
return ProxyDnsConfig(cloudflared_binary=config['cloudflared_binary'])
|
return ProxyDnsConfig(cloudflared_binary=config['cloudflared_binary'])
|
||||||
|
elif cfd_mode is CfdModes.QUICK:
|
||||||
|
return QuickTunnelConfig(additional_config=additional_config, cloudflared_binary=config['cloudflared_binary'])
|
||||||
else:
|
else:
|
||||||
raise Exception(f"Unknown cloudflared mode {cfd_mode}")
|
raise Exception(f"Unknown cloudflared mode {cfd_mode}")
|
||||||
|
|
||||||
|
|
|
@ -4,7 +4,8 @@ BACKOFF_SECS = 7
|
||||||
MAX_LOG_LINES = 50
|
MAX_LOG_LINES = 50
|
||||||
|
|
||||||
PROXY_DNS_PORT = 9053
|
PROXY_DNS_PORT = 9053
|
||||||
|
MANAGEMENT_HOST_NAME = "management.argotunnel.com"
|
||||||
|
|
||||||
|
|
||||||
def protocols():
|
def protocols():
|
||||||
return ["h2mux", "http2", "quic"]
|
return ["http2", "quic"]
|
||||||
|
|
|
@ -1,6 +1,8 @@
|
||||||
cloudflare==2.8.15
|
cloudflare==2.8.15
|
||||||
flaky==3.7.0
|
flaky==3.7.0
|
||||||
pytest==6.2.2
|
pytest==7.3.1
|
||||||
|
pytest-asyncio==0.21.0
|
||||||
pyyaml==5.4.1
|
pyyaml==5.4.1
|
||||||
requests==2.25.1
|
requests==2.28.2
|
||||||
retrying==1.3.3
|
retrying==1.3.4
|
||||||
|
websockets==11.0.1
|
||||||
|
|
|
@ -81,12 +81,6 @@ def create_dns(config, hostname, type, content):
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
def create_classic_dns(config, random_uuid):
|
|
||||||
classic_hostname = "classic-" + random_uuid + "." + config["zone_domain"]
|
|
||||||
create_dns(config, classic_hostname, "AAAA", "fd10:aec2:5dae::")
|
|
||||||
return classic_hostname
|
|
||||||
|
|
||||||
|
|
||||||
def create_named_dns(config, random_uuid):
|
def create_named_dns(config, random_uuid):
|
||||||
hostname = "named-" + random_uuid + "." + config["zone_domain"]
|
hostname = "named-" + random_uuid + "." + config["zone_domain"]
|
||||||
create_dns(config, hostname, "CNAME", config["tunnel"] + ".cfargotunnel.com")
|
create_dns(config, hostname, "CNAME", config["tunnel"] + ".cfargotunnel.com")
|
||||||
|
@ -119,7 +113,6 @@ def create():
|
||||||
Creates the necessary resources for the components test to run.
|
Creates the necessary resources for the components test to run.
|
||||||
- Creates a named tunnel with a random name.
|
- Creates a named tunnel with a random name.
|
||||||
- Creates a random CNAME DNS entry for that tunnel.
|
- Creates a random CNAME DNS entry for that tunnel.
|
||||||
- Creates a random AAAA DNS entry for a classic tunnel.
|
|
||||||
|
|
||||||
Those created resources are added to the config (obtained from an environment variable).
|
Those created resources are added to the config (obtained from an environment variable).
|
||||||
The resulting configuration is persisted for the tests to use.
|
The resulting configuration is persisted for the tests to use.
|
||||||
|
@ -129,7 +122,6 @@ def create():
|
||||||
|
|
||||||
random_uuid = str(uuid.uuid4())
|
random_uuid = str(uuid.uuid4())
|
||||||
config["tunnel"] = create_tunnel(config, origincert_path, random_uuid)
|
config["tunnel"] = create_tunnel(config, origincert_path, random_uuid)
|
||||||
config["classic_hostname"] = create_classic_dns(config, random_uuid)
|
|
||||||
config["ingress"] = [
|
config["ingress"] = [
|
||||||
{
|
{
|
||||||
"hostname": create_named_dns(config, random_uuid),
|
"hostname": create_named_dns(config, random_uuid),
|
||||||
|
@ -150,7 +142,6 @@ def cleanup():
|
||||||
"""
|
"""
|
||||||
config = get_config_from_file()
|
config = get_config_from_file()
|
||||||
delete_tunnel(config)
|
delete_tunnel(config)
|
||||||
delete_dns(config, config["classic_hostname"])
|
|
||||||
delete_dns(config, config["ingress"][0]["hostname"])
|
delete_dns(config, config["ingress"][0]["hostname"])
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -74,7 +74,7 @@ def assert_log_to_dir(config, log_dir):
|
||||||
class TestLogging:
|
class TestLogging:
|
||||||
def test_logging_to_terminal(self, tmp_path, component_tests_config):
|
def test_logging_to_terminal(self, tmp_path, component_tests_config):
|
||||||
config = component_tests_config()
|
config = component_tests_config()
|
||||||
with start_cloudflared(tmp_path, config, new_process=True) as cloudflared:
|
with start_cloudflared(tmp_path, config, cfd_pre_args=["tunnel", "--ha-connections", "1"], new_process=True) as cloudflared:
|
||||||
wait_tunnel_ready(tunnel_url=config.get_url())
|
wait_tunnel_ready(tunnel_url=config.get_url())
|
||||||
assert_log_to_terminal(cloudflared)
|
assert_log_to_terminal(cloudflared)
|
||||||
|
|
||||||
|
@ -85,7 +85,7 @@ class TestLogging:
|
||||||
"logfile": str(log_file),
|
"logfile": str(log_file),
|
||||||
}
|
}
|
||||||
config = component_tests_config(extra_config)
|
config = component_tests_config(extra_config)
|
||||||
with start_cloudflared(tmp_path, config, new_process=True, capture_output=False):
|
with start_cloudflared(tmp_path, config, cfd_pre_args=["tunnel", "--ha-connections", "1"], new_process=True, capture_output=False):
|
||||||
wait_tunnel_ready(tunnel_url=config.get_url(), cfd_logs=str(log_file))
|
wait_tunnel_ready(tunnel_url=config.get_url(), cfd_logs=str(log_file))
|
||||||
assert_log_in_file(log_file)
|
assert_log_in_file(log_file)
|
||||||
assert_json_log(log_file)
|
assert_json_log(log_file)
|
||||||
|
@ -98,6 +98,6 @@ class TestLogging:
|
||||||
"log-directory": str(log_dir),
|
"log-directory": str(log_dir),
|
||||||
}
|
}
|
||||||
config = component_tests_config(extra_config)
|
config = component_tests_config(extra_config)
|
||||||
with start_cloudflared(tmp_path, config, new_process=True, capture_output=False):
|
with start_cloudflared(tmp_path, config, cfd_pre_args=["tunnel", "--ha-connections", "1"], new_process=True, capture_output=False):
|
||||||
wait_tunnel_ready(tunnel_url=config.get_url(), cfd_logs=str(log_dir))
|
wait_tunnel_ready(tunnel_url=config.get_url(), cfd_logs=str(log_dir))
|
||||||
assert_log_to_dir(config, log_dir)
|
assert_log_to_dir(config, log_dir)
|
||||||
|
|
|
@ -12,6 +12,6 @@ class TestPostQuantum:
|
||||||
def test_post_quantum(self, tmp_path, component_tests_config):
|
def test_post_quantum(self, tmp_path, component_tests_config):
|
||||||
config = component_tests_config(self._extra_config())
|
config = component_tests_config(self._extra_config())
|
||||||
LOGGER.debug(config)
|
LOGGER.debug(config)
|
||||||
with start_cloudflared(tmp_path, config, cfd_args=["run", "--post-quantum"], new_process=True):
|
with start_cloudflared(tmp_path, config, cfd_pre_args=["tunnel", "--ha-connections", "1"], cfd_args=["run", "--post-quantum"], new_process=True):
|
||||||
wait_tunnel_ready(tunnel_url=config.get_url(),
|
wait_tunnel_ready(tunnel_url=config.get_url(),
|
||||||
require_min_connections=4)
|
require_min_connections=1)
|
||||||
|
|
|
@ -12,18 +12,12 @@ class TestProxyDns:
|
||||||
def test_proxy_dns_with_named_tunnel(self, tmp_path, component_tests_config):
|
def test_proxy_dns_with_named_tunnel(self, tmp_path, component_tests_config):
|
||||||
run_test_scenario(tmp_path, component_tests_config, CfdModes.NAMED, run_proxy_dns=True)
|
run_test_scenario(tmp_path, component_tests_config, CfdModes.NAMED, run_proxy_dns=True)
|
||||||
|
|
||||||
def test_proxy_dns_with_classic_tunnel(self, tmp_path, component_tests_config):
|
|
||||||
run_test_scenario(tmp_path, component_tests_config, CfdModes.CLASSIC, run_proxy_dns=True)
|
|
||||||
|
|
||||||
def test_proxy_dns_alone(self, tmp_path, component_tests_config):
|
def test_proxy_dns_alone(self, tmp_path, component_tests_config):
|
||||||
run_test_scenario(tmp_path, component_tests_config, CfdModes.PROXY_DNS, run_proxy_dns=True)
|
run_test_scenario(tmp_path, component_tests_config, CfdModes.PROXY_DNS, run_proxy_dns=True)
|
||||||
|
|
||||||
def test_named_tunnel_alone(self, tmp_path, component_tests_config):
|
def test_named_tunnel_alone(self, tmp_path, component_tests_config):
|
||||||
run_test_scenario(tmp_path, component_tests_config, CfdModes.NAMED, run_proxy_dns=False)
|
run_test_scenario(tmp_path, component_tests_config, CfdModes.NAMED, run_proxy_dns=False)
|
||||||
|
|
||||||
def test_classic_tunnel_alone(self, tmp_path, component_tests_config):
|
|
||||||
run_test_scenario(tmp_path, component_tests_config, CfdModes.CLASSIC, run_proxy_dns=False)
|
|
||||||
|
|
||||||
|
|
||||||
def run_test_scenario(tmp_path, component_tests_config, cfd_mode, run_proxy_dns):
|
def run_test_scenario(tmp_path, component_tests_config, cfd_mode, run_proxy_dns):
|
||||||
expect_proxy_dns = run_proxy_dns
|
expect_proxy_dns = run_proxy_dns
|
||||||
|
@ -31,12 +25,8 @@ def run_test_scenario(tmp_path, component_tests_config, cfd_mode, run_proxy_dns)
|
||||||
|
|
||||||
if cfd_mode == CfdModes.NAMED:
|
if cfd_mode == CfdModes.NAMED:
|
||||||
expect_tunnel = True
|
expect_tunnel = True
|
||||||
pre_args = ["tunnel"]
|
pre_args = ["tunnel", "--ha-connections", "1"]
|
||||||
args = ["run"]
|
args = ["run"]
|
||||||
elif cfd_mode == CfdModes.CLASSIC:
|
|
||||||
expect_tunnel = True
|
|
||||||
pre_args = []
|
|
||||||
args = []
|
|
||||||
elif cfd_mode == CfdModes.PROXY_DNS:
|
elif cfd_mode == CfdModes.PROXY_DNS:
|
||||||
expect_proxy_dns = True
|
expect_proxy_dns = True
|
||||||
pre_args = []
|
pre_args = []
|
||||||
|
|
|
@ -0,0 +1,33 @@
|
||||||
|
#!/usr/bin/env python
|
||||||
|
from conftest import CfdModes
|
||||||
|
from constants import METRICS_PORT
|
||||||
|
from util import LOGGER, start_cloudflared, wait_tunnel_ready, get_quicktunnel_url, send_requests
|
||||||
|
|
||||||
|
class TestQuickTunnels:
|
||||||
|
def test_quick_tunnel(self, tmp_path, component_tests_config):
|
||||||
|
config = component_tests_config(cfd_mode=CfdModes.QUICK, run_proxy_dns=False)
|
||||||
|
LOGGER.debug(config)
|
||||||
|
with start_cloudflared(tmp_path, config, cfd_pre_args=["tunnel", "--ha-connections", "1"], cfd_args=["--hello-world"], new_process=True):
|
||||||
|
wait_tunnel_ready(require_min_connections=1)
|
||||||
|
url = get_quicktunnel_url()
|
||||||
|
send_requests(url, 3, True)
|
||||||
|
|
||||||
|
def test_quick_tunnel_url(self, tmp_path, component_tests_config):
|
||||||
|
config = component_tests_config(cfd_mode=CfdModes.QUICK, run_proxy_dns=False)
|
||||||
|
LOGGER.debug(config)
|
||||||
|
with start_cloudflared(tmp_path, config, cfd_pre_args=["tunnel", "--ha-connections", "1"], cfd_args=["--url", f"http://localhost:{METRICS_PORT}/"], new_process=True):
|
||||||
|
wait_tunnel_ready(require_min_connections=1)
|
||||||
|
url = get_quicktunnel_url()
|
||||||
|
send_requests(url+"/ready", 3, True)
|
||||||
|
|
||||||
|
def test_quick_tunnel_proxy_dns_url(self, tmp_path, component_tests_config):
|
||||||
|
config = component_tests_config(cfd_mode=CfdModes.QUICK, run_proxy_dns=True)
|
||||||
|
LOGGER.debug(config)
|
||||||
|
failed_start = start_cloudflared(tmp_path, config, cfd_args=["--url", f"http://localhost:{METRICS_PORT}/"], expect_success=False)
|
||||||
|
assert failed_start.returncode == 1, "Expected cloudflared to fail to run with `proxy-dns` and `hello-world`"
|
||||||
|
|
||||||
|
def test_quick_tunnel_proxy_dns_hello_world(self, tmp_path, component_tests_config):
|
||||||
|
config = component_tests_config(cfd_mode=CfdModes.QUICK, run_proxy_dns=True)
|
||||||
|
LOGGER.debug(config)
|
||||||
|
failed_start = start_cloudflared(tmp_path, config, cfd_args=["--hello-world"], expect_success=False)
|
||||||
|
assert failed_start.returncode == 1, "Expected cloudflared to fail to run with `proxy-dns` and `url`"
|
|
@ -13,7 +13,7 @@ from util import start_cloudflared, wait_tunnel_ready, check_tunnel_not_connecte
|
||||||
|
|
||||||
@flaky(max_runs=3, min_passes=1)
|
@flaky(max_runs=3, min_passes=1)
|
||||||
class TestReconnect:
|
class TestReconnect:
|
||||||
default_ha_conns = 4
|
default_ha_conns = 1
|
||||||
default_reconnect_secs = 15
|
default_reconnect_secs = 15
|
||||||
extra_config = {
|
extra_config = {
|
||||||
"stdin-control": True,
|
"stdin-control": True,
|
||||||
|
@ -29,17 +29,10 @@ class TestReconnect:
|
||||||
@pytest.mark.parametrize("protocol", protocols())
|
@pytest.mark.parametrize("protocol", protocols())
|
||||||
def test_named_reconnect(self, tmp_path, component_tests_config, protocol):
|
def test_named_reconnect(self, tmp_path, component_tests_config, protocol):
|
||||||
config = component_tests_config(self._extra_config(protocol))
|
config = component_tests_config(self._extra_config(protocol))
|
||||||
with start_cloudflared(tmp_path, config, new_process=True, allow_input=True, capture_output=False) as cloudflared:
|
with start_cloudflared(tmp_path, config, cfd_pre_args=["tunnel", "--ha-connections", "1"], new_process=True, allow_input=True, capture_output=False) as cloudflared:
|
||||||
# Repeat the test multiple times because some issues only occur after multiple reconnects
|
# Repeat the test multiple times because some issues only occur after multiple reconnects
|
||||||
self.assert_reconnect(config, cloudflared, 5)
|
self.assert_reconnect(config, cloudflared, 5)
|
||||||
|
|
||||||
def test_classic_reconnect(self, tmp_path, component_tests_config):
|
|
||||||
extra_config = copy.copy(self.extra_config)
|
|
||||||
extra_config["hello-world"] = True
|
|
||||||
config = component_tests_config(additional_config=extra_config, cfd_mode=CfdModes.CLASSIC)
|
|
||||||
with start_cloudflared(tmp_path, config, cfd_args=[], new_process=True, allow_input=True, capture_output=False) as cloudflared:
|
|
||||||
self.assert_reconnect(config, cloudflared, 1)
|
|
||||||
|
|
||||||
def send_reconnect(self, cloudflared, secs):
|
def send_reconnect(self, cloudflared, secs):
|
||||||
# Although it is recommended to use the Popen.communicate method, we cannot
|
# Although it is recommended to use the Popen.communicate method, we cannot
|
||||||
# use it because it blocks on reading stdout and stderr until EOF is reached
|
# use it because it blocks on reading stdout and stderr until EOF is reached
|
||||||
|
|
|
@ -0,0 +1,182 @@
|
||||||
|
#!/usr/bin/env python
|
||||||
|
import asyncio
|
||||||
|
import json
|
||||||
|
import pytest
|
||||||
|
import requests
|
||||||
|
import websockets
|
||||||
|
from websockets.client import connect, WebSocketClientProtocol
|
||||||
|
from conftest import CfdModes
|
||||||
|
from constants import MAX_RETRIES, BACKOFF_SECS
|
||||||
|
from retrying import retry
|
||||||
|
from cli import CloudflaredCli
|
||||||
|
from util import LOGGER, start_cloudflared, write_config, wait_tunnel_ready
|
||||||
|
|
||||||
|
class TestTail:
|
||||||
|
@pytest.mark.asyncio
|
||||||
|
async def test_start_stop_streaming(self, tmp_path, component_tests_config):
|
||||||
|
"""
|
||||||
|
Validates that a websocket connection to management.argotunnel.com/logs can be opened
|
||||||
|
with the access token and start and stop streaming on-demand.
|
||||||
|
"""
|
||||||
|
print("test_start_stop_streaming")
|
||||||
|
config = component_tests_config(cfd_mode=CfdModes.NAMED, run_proxy_dns=False, provide_ingress=False)
|
||||||
|
LOGGER.debug(config)
|
||||||
|
config_path = write_config(tmp_path, config.full_config)
|
||||||
|
with start_cloudflared(tmp_path, config, cfd_args=["run", "--hello-world"], new_process=True):
|
||||||
|
wait_tunnel_ready(tunnel_url=config.get_url(), require_min_connections=1)
|
||||||
|
cfd_cli = CloudflaredCli(config, config_path, LOGGER)
|
||||||
|
url = cfd_cli.get_management_wsurl("logs", config, config_path)
|
||||||
|
async with connect(url, open_timeout=5, close_timeout=3) as websocket:
|
||||||
|
await websocket.send('{"type": "start_streaming"}')
|
||||||
|
await websocket.send('{"type": "stop_streaming"}')
|
||||||
|
await websocket.send('{"type": "start_streaming"}')
|
||||||
|
await websocket.send('{"type": "stop_streaming"}')
|
||||||
|
|
||||||
|
@pytest.mark.asyncio
|
||||||
|
async def test_streaming_logs(self, tmp_path, component_tests_config):
|
||||||
|
"""
|
||||||
|
Validates that a streaming logs connection will stream logs
|
||||||
|
"""
|
||||||
|
print("test_streaming_logs")
|
||||||
|
config = component_tests_config(cfd_mode=CfdModes.NAMED, run_proxy_dns=False, provide_ingress=False)
|
||||||
|
LOGGER.debug(config)
|
||||||
|
config_path = write_config(tmp_path, config.full_config)
|
||||||
|
with start_cloudflared(tmp_path, config, cfd_args=["run", "--hello-world"], new_process=True):
|
||||||
|
wait_tunnel_ready(tunnel_url=config.get_url(), require_min_connections=1)
|
||||||
|
cfd_cli = CloudflaredCli(config, config_path, LOGGER)
|
||||||
|
url = cfd_cli.get_management_wsurl("logs", config, config_path)
|
||||||
|
async with connect(url, open_timeout=5, close_timeout=5) as websocket:
|
||||||
|
# send start_streaming
|
||||||
|
await websocket.send('{"type": "start_streaming"}')
|
||||||
|
# send some http requests to the tunnel to trigger some logs
|
||||||
|
await generate_and_validate_http_events(websocket, config.get_url(), 10)
|
||||||
|
# send stop_streaming
|
||||||
|
await websocket.send('{"type": "stop_streaming"}')
|
||||||
|
|
||||||
|
@pytest.mark.asyncio
|
||||||
|
async def test_streaming_logs_filters(self, tmp_path, component_tests_config):
|
||||||
|
"""
|
||||||
|
Validates that a streaming logs connection will stream logs
|
||||||
|
but not http when filters applied.
|
||||||
|
"""
|
||||||
|
print("test_streaming_logs_filters")
|
||||||
|
config = component_tests_config(cfd_mode=CfdModes.NAMED, run_proxy_dns=False, provide_ingress=False)
|
||||||
|
LOGGER.debug(config)
|
||||||
|
config_path = write_config(tmp_path, config.full_config)
|
||||||
|
with start_cloudflared(tmp_path, config, cfd_args=["run", "--hello-world"], new_process=True):
|
||||||
|
wait_tunnel_ready(tunnel_url=config.get_url(), require_min_connections=1)
|
||||||
|
cfd_cli = CloudflaredCli(config, config_path, LOGGER)
|
||||||
|
url = cfd_cli.get_management_wsurl("logs", config, config_path)
|
||||||
|
async with connect(url, open_timeout=5, close_timeout=5) as websocket:
|
||||||
|
# send start_streaming with tcp logs only
|
||||||
|
await websocket.send(json.dumps({
|
||||||
|
"type": "start_streaming",
|
||||||
|
"filters": {
|
||||||
|
"events": ["tcp"],
|
||||||
|
"level": "debug"
|
||||||
|
}
|
||||||
|
}))
|
||||||
|
# don't expect any http logs
|
||||||
|
await generate_and_validate_no_log_event(websocket, config.get_url())
|
||||||
|
# send stop_streaming
|
||||||
|
await websocket.send('{"type": "stop_streaming"}')
|
||||||
|
|
||||||
|
@pytest.mark.asyncio
|
||||||
|
async def test_streaming_logs_sampling(self, tmp_path, component_tests_config):
|
||||||
|
"""
|
||||||
|
Validates that a streaming logs connection will stream logs with sampling.
|
||||||
|
"""
|
||||||
|
print("test_streaming_logs_sampling")
|
||||||
|
config = component_tests_config(cfd_mode=CfdModes.NAMED, run_proxy_dns=False, provide_ingress=False)
|
||||||
|
LOGGER.debug(config)
|
||||||
|
config_path = write_config(tmp_path, config.full_config)
|
||||||
|
with start_cloudflared(tmp_path, config, cfd_args=["run", "--hello-world"], new_process=True):
|
||||||
|
wait_tunnel_ready(tunnel_url=config.get_url(), require_min_connections=1)
|
||||||
|
cfd_cli = CloudflaredCli(config, config_path, LOGGER)
|
||||||
|
url = cfd_cli.get_management_wsurl("logs", config, config_path)
|
||||||
|
async with connect(url, open_timeout=5, close_timeout=5) as websocket:
|
||||||
|
# send start_streaming with info logs only
|
||||||
|
await websocket.send(json.dumps({
|
||||||
|
"type": "start_streaming",
|
||||||
|
"filters": {
|
||||||
|
"sampling": 0.5
|
||||||
|
}
|
||||||
|
}))
|
||||||
|
# don't expect any http logs
|
||||||
|
count = await generate_and_validate_http_events(websocket, config.get_url(), 10)
|
||||||
|
assert count < (10 * 2) # There are typically always two log lines for http requests (request and response)
|
||||||
|
# send stop_streaming
|
||||||
|
await websocket.send('{"type": "stop_streaming"}')
|
||||||
|
|
||||||
|
@pytest.mark.asyncio
|
||||||
|
async def test_streaming_logs_actor_override(self, tmp_path, component_tests_config):
|
||||||
|
"""
|
||||||
|
Validates that a streaming logs session can be overriden by the same actor
|
||||||
|
"""
|
||||||
|
print("test_streaming_logs_actor_override")
|
||||||
|
config = component_tests_config(cfd_mode=CfdModes.NAMED, run_proxy_dns=False, provide_ingress=False)
|
||||||
|
LOGGER.debug(config)
|
||||||
|
config_path = write_config(tmp_path, config.full_config)
|
||||||
|
with start_cloudflared(tmp_path, config, cfd_args=["run", "--hello-world"], new_process=True):
|
||||||
|
wait_tunnel_ready(tunnel_url=config.get_url(), require_min_connections=1)
|
||||||
|
cfd_cli = CloudflaredCli(config, config_path, LOGGER)
|
||||||
|
url = cfd_cli.get_management_wsurl("logs", config, config_path)
|
||||||
|
task = asyncio.ensure_future(start_streaming_to_be_remotely_closed(url))
|
||||||
|
override_task = asyncio.ensure_future(start_streaming_override(url))
|
||||||
|
await asyncio.wait([task, override_task])
|
||||||
|
assert task.exception() == None, task.exception()
|
||||||
|
assert override_task.exception() == None, override_task.exception()
|
||||||
|
|
||||||
|
async def start_streaming_to_be_remotely_closed(url):
|
||||||
|
async with connect(url, open_timeout=5, close_timeout=5) as websocket:
|
||||||
|
try:
|
||||||
|
await websocket.send(json.dumps({"type": "start_streaming"}))
|
||||||
|
await asyncio.sleep(10)
|
||||||
|
assert websocket.closed, "expected this request to be forcibly closed by the override"
|
||||||
|
except websockets.ConnectionClosed:
|
||||||
|
# we expect the request to be closed
|
||||||
|
pass
|
||||||
|
|
||||||
|
async def start_streaming_override(url):
|
||||||
|
# wait for the first connection to be established
|
||||||
|
await asyncio.sleep(1)
|
||||||
|
async with connect(url, open_timeout=5, close_timeout=5) as websocket:
|
||||||
|
await websocket.send(json.dumps({"type": "start_streaming"}))
|
||||||
|
await asyncio.sleep(1)
|
||||||
|
await websocket.send(json.dumps({"type": "stop_streaming"}))
|
||||||
|
await asyncio.sleep(1)
|
||||||
|
|
||||||
|
# Every http request has two log lines sent
|
||||||
|
async def generate_and_validate_http_events(websocket: WebSocketClientProtocol, url: str, count_send: int):
|
||||||
|
for i in range(count_send):
|
||||||
|
send_request(url)
|
||||||
|
# There are typically always two log lines for http requests (request and response)
|
||||||
|
count = 0
|
||||||
|
while True:
|
||||||
|
try:
|
||||||
|
req_line = await asyncio.wait_for(websocket.recv(), 2)
|
||||||
|
log_line = json.loads(req_line)
|
||||||
|
assert log_line["type"] == "logs"
|
||||||
|
assert log_line["logs"][0]["event"] == "http"
|
||||||
|
count += 1
|
||||||
|
except asyncio.TimeoutError:
|
||||||
|
# ignore timeout from waiting for recv
|
||||||
|
break
|
||||||
|
return count
|
||||||
|
|
||||||
|
# Every http request has two log lines sent
|
||||||
|
async def generate_and_validate_no_log_event(websocket: WebSocketClientProtocol, url: str):
|
||||||
|
send_request(url)
|
||||||
|
try:
|
||||||
|
# wait for 5 seconds and make sure we hit the timeout and not recv any events
|
||||||
|
req_line = await asyncio.wait_for(websocket.recv(), 5)
|
||||||
|
assert req_line == None, "expected no logs for the specified filters"
|
||||||
|
except asyncio.TimeoutError:
|
||||||
|
pass
|
||||||
|
|
||||||
|
@retry(stop_max_attempt_number=MAX_RETRIES, wait_fixed=BACKOFF_SECS * 1000)
|
||||||
|
def send_request(url, headers={}):
|
||||||
|
with requests.Session() as s:
|
||||||
|
resp = s.get(url, timeout=BACKOFF_SECS, headers=headers)
|
||||||
|
assert resp.status_code == 200, f"{url} returned {resp}"
|
||||||
|
return resp.status_code == 200
|
|
@ -34,7 +34,7 @@ class TestTermination:
|
||||||
def test_graceful_shutdown(self, tmp_path, component_tests_config, signal, protocol):
|
def test_graceful_shutdown(self, tmp_path, component_tests_config, signal, protocol):
|
||||||
config = component_tests_config(self._extra_config(protocol))
|
config = component_tests_config(self._extra_config(protocol))
|
||||||
with start_cloudflared(
|
with start_cloudflared(
|
||||||
tmp_path, config, new_process=True, capture_output=False) as cloudflared:
|
tmp_path, config, cfd_pre_args=["tunnel", "--ha-connections", "1"], new_process=True, capture_output=False) as cloudflared:
|
||||||
wait_tunnel_ready(tunnel_url=config.get_url())
|
wait_tunnel_ready(tunnel_url=config.get_url())
|
||||||
|
|
||||||
connected = threading.Condition()
|
connected = threading.Condition()
|
||||||
|
@ -56,7 +56,7 @@ class TestTermination:
|
||||||
def test_shutdown_once_no_connection(self, tmp_path, component_tests_config, signal, protocol):
|
def test_shutdown_once_no_connection(self, tmp_path, component_tests_config, signal, protocol):
|
||||||
config = component_tests_config(self._extra_config(protocol))
|
config = component_tests_config(self._extra_config(protocol))
|
||||||
with start_cloudflared(
|
with start_cloudflared(
|
||||||
tmp_path, config, new_process=True, capture_output=False) as cloudflared:
|
tmp_path, config, cfd_pre_args=["tunnel", "--ha-connections", "1"], new_process=True, capture_output=False) as cloudflared:
|
||||||
wait_tunnel_ready(tunnel_url=config.get_url())
|
wait_tunnel_ready(tunnel_url=config.get_url())
|
||||||
|
|
||||||
connected = threading.Condition()
|
connected = threading.Condition()
|
||||||
|
@ -76,7 +76,7 @@ class TestTermination:
|
||||||
def test_no_connection_shutdown(self, tmp_path, component_tests_config, signal, protocol):
|
def test_no_connection_shutdown(self, tmp_path, component_tests_config, signal, protocol):
|
||||||
config = component_tests_config(self._extra_config(protocol))
|
config = component_tests_config(self._extra_config(protocol))
|
||||||
with start_cloudflared(
|
with start_cloudflared(
|
||||||
tmp_path, config, new_process=True, capture_output=False) as cloudflared:
|
tmp_path, config, cfd_pre_args=["tunnel", "--ha-connections", "1"], new_process=True, capture_output=False) as cloudflared:
|
||||||
wait_tunnel_ready(tunnel_url=config.get_url())
|
wait_tunnel_ready(tunnel_url=config.get_url())
|
||||||
with self.within_grace_period():
|
with self.within_grace_period():
|
||||||
self.terminate_by_signal(cloudflared, signal)
|
self.terminate_by_signal(cloudflared, signal)
|
||||||
|
|
|
@ -0,0 +1,77 @@
|
||||||
|
#!/usr/bin/env python
|
||||||
|
import requests
|
||||||
|
from conftest import CfdModes
|
||||||
|
from constants import METRICS_PORT, MAX_RETRIES, BACKOFF_SECS
|
||||||
|
from retrying import retry
|
||||||
|
from cli import CloudflaredCli
|
||||||
|
from util import LOGGER, write_config, start_cloudflared, wait_tunnel_ready, send_requests
|
||||||
|
import platform
|
||||||
|
|
||||||
|
class TestTunnel:
|
||||||
|
'''Test tunnels with no ingress rules from config.yaml but ingress rules from CLI only'''
|
||||||
|
|
||||||
|
def test_tunnel_hello_world(self, tmp_path, component_tests_config):
|
||||||
|
config = component_tests_config(cfd_mode=CfdModes.NAMED, run_proxy_dns=False, provide_ingress=False)
|
||||||
|
LOGGER.debug(config)
|
||||||
|
with start_cloudflared(tmp_path, config, cfd_pre_args=["tunnel", "--ha-connections", "1"], cfd_args=["run", "--hello-world"], new_process=True):
|
||||||
|
wait_tunnel_ready(tunnel_url=config.get_url(),
|
||||||
|
require_min_connections=1)
|
||||||
|
|
||||||
|
"""
|
||||||
|
test_get_host_details does the following:
|
||||||
|
1. It gets a management token from Tunnelstore using cloudflared tail token <tunnel_id>
|
||||||
|
2. It gets the connector_id after starting a cloudflare tunnel
|
||||||
|
3. It sends a request to the management host with the connector_id and management token
|
||||||
|
4. Asserts that the response has a hostname and ip.
|
||||||
|
"""
|
||||||
|
def test_get_host_details(self, tmp_path, component_tests_config):
|
||||||
|
# TUN-7377 : wait_tunnel_ready does not work properly in windows.
|
||||||
|
# Skipping this test for windows for now and will address it as part of tun-7377
|
||||||
|
if platform.system() == "Windows":
|
||||||
|
return
|
||||||
|
config = component_tests_config(cfd_mode=CfdModes.NAMED, run_proxy_dns=False, provide_ingress=False)
|
||||||
|
LOGGER.debug(config)
|
||||||
|
headers = {}
|
||||||
|
headers["Content-Type"] = "application/json"
|
||||||
|
config_path = write_config(tmp_path, config.full_config)
|
||||||
|
with start_cloudflared(tmp_path, config, cfd_pre_args=["tunnel", "--ha-connections", "1", "--label" , "test"], cfd_args=["run", "--hello-world"], new_process=True):
|
||||||
|
wait_tunnel_ready(tunnel_url=config.get_url(),
|
||||||
|
require_min_connections=1)
|
||||||
|
cfd_cli = CloudflaredCli(config, config_path, LOGGER)
|
||||||
|
connector_id = cfd_cli.get_connector_id(config)[0]
|
||||||
|
url = cfd_cli.get_management_url("host_details", config, config_path)
|
||||||
|
resp = send_request(url, headers=headers)
|
||||||
|
|
||||||
|
# Assert response json.
|
||||||
|
assert resp.status_code == 200, "Expected cloudflared to return 200 for host details"
|
||||||
|
assert resp.json()["hostname"] == "custom:test", "Expected cloudflared to return hostname"
|
||||||
|
assert resp.json()["ip"] != "", "Expected cloudflared to return ip"
|
||||||
|
assert resp.json()["connector_id"] == connector_id, "Expected cloudflared to return connector_id"
|
||||||
|
|
||||||
|
|
||||||
|
def test_tunnel_url(self, tmp_path, component_tests_config):
|
||||||
|
config = component_tests_config(cfd_mode=CfdModes.NAMED, run_proxy_dns=False, provide_ingress=False)
|
||||||
|
LOGGER.debug(config)
|
||||||
|
with start_cloudflared(tmp_path, config, cfd_pre_args=["tunnel", "--ha-connections", "1"], cfd_args=["run", "--url", f"http://localhost:{METRICS_PORT}/"], new_process=True):
|
||||||
|
wait_tunnel_ready(require_min_connections=1)
|
||||||
|
send_requests(config.get_url()+"/ready", 3, True)
|
||||||
|
|
||||||
|
def test_tunnel_no_ingress(self, tmp_path, component_tests_config):
|
||||||
|
'''
|
||||||
|
Running a tunnel with no ingress rules provided from either config.yaml or CLI will still work but return 503
|
||||||
|
for all incoming requests.
|
||||||
|
'''
|
||||||
|
config = component_tests_config(cfd_mode=CfdModes.NAMED, run_proxy_dns=False, provide_ingress=False)
|
||||||
|
LOGGER.debug(config)
|
||||||
|
with start_cloudflared(tmp_path, config, cfd_pre_args=["tunnel", "--ha-connections", "1"], cfd_args=["run"], new_process=True):
|
||||||
|
wait_tunnel_ready(require_min_connections=1)
|
||||||
|
resp = send_request(config.get_url()+"/")
|
||||||
|
assert resp.status_code == 503, "Expected cloudflared to return 503 for all requests with no ingress defined"
|
||||||
|
resp = send_request(config.get_url()+"/test")
|
||||||
|
assert resp.status_code == 503, "Expected cloudflared to return 503 for all requests with no ingress defined"
|
||||||
|
|
||||||
|
|
||||||
|
@retry(stop_max_attempt_number=MAX_RETRIES, wait_fixed=BACKOFF_SECS * 1000)
|
||||||
|
def send_request(url, headers={}):
|
||||||
|
with requests.Session() as s:
|
||||||
|
return s.get(url, timeout=BACKOFF_SECS, headers=headers)
|
|
@ -9,6 +9,7 @@ import pytest
|
||||||
|
|
||||||
import requests
|
import requests
|
||||||
import yaml
|
import yaml
|
||||||
|
import json
|
||||||
from retrying import retry
|
from retrying import retry
|
||||||
|
|
||||||
from constants import METRICS_PORT, MAX_RETRIES, BACKOFF_SECS
|
from constants import METRICS_PORT, MAX_RETRIES, BACKOFF_SECS
|
||||||
|
@ -35,7 +36,7 @@ def write_config(directory, config):
|
||||||
|
|
||||||
|
|
||||||
def start_cloudflared(directory, config, cfd_args=["run"], cfd_pre_args=["tunnel"], new_process=False,
|
def start_cloudflared(directory, config, cfd_args=["run"], cfd_pre_args=["tunnel"], new_process=False,
|
||||||
allow_input=False, capture_output=True, root=False, skip_config_flag=False):
|
allow_input=False, capture_output=True, root=False, skip_config_flag=False, expect_success=True):
|
||||||
|
|
||||||
config_path = None
|
config_path = None
|
||||||
if not skip_config_flag:
|
if not skip_config_flag:
|
||||||
|
@ -46,8 +47,7 @@ def start_cloudflared(directory, config, cfd_args=["run"], cfd_pre_args=["tunnel
|
||||||
if new_process:
|
if new_process:
|
||||||
return run_cloudflared_background(cmd, allow_input, capture_output)
|
return run_cloudflared_background(cmd, allow_input, capture_output)
|
||||||
# By setting check=True, it will raise an exception if the process exits with non-zero exit code
|
# By setting check=True, it will raise an exception if the process exits with non-zero exit code
|
||||||
return subprocess.run(cmd, check=True, capture_output=capture_output)
|
return subprocess.run(cmd, check=expect_success, capture_output=capture_output)
|
||||||
|
|
||||||
|
|
||||||
def cloudflared_cmd(config, config_path, cfd_args, cfd_pre_args, root):
|
def cloudflared_cmd(config, config_path, cfd_args, cfd_pre_args, root):
|
||||||
cmd = []
|
cmd = []
|
||||||
|
@ -77,7 +77,18 @@ def run_cloudflared_background(cmd, allow_input, capture_output):
|
||||||
cfd.terminate()
|
cfd.terminate()
|
||||||
if capture_output:
|
if capture_output:
|
||||||
LOGGER.info(f"cloudflared log: {cfd.stderr.read()}")
|
LOGGER.info(f"cloudflared log: {cfd.stderr.read()}")
|
||||||
|
|
||||||
|
|
||||||
|
def get_quicktunnel_url():
|
||||||
|
quicktunnel_url = f'http://localhost:{METRICS_PORT}/quicktunnel'
|
||||||
|
with requests.Session() as s:
|
||||||
|
resp = send_request(s, quicktunnel_url, True)
|
||||||
|
|
||||||
|
hostname = resp.json()["hostname"]
|
||||||
|
assert hostname, \
|
||||||
|
f"Quicktunnel endpoint returned {hostname} but we expected a url"
|
||||||
|
|
||||||
|
return f"https://{hostname}"
|
||||||
|
|
||||||
def wait_tunnel_ready(tunnel_url=None, require_min_connections=1, cfd_logs=None):
|
def wait_tunnel_ready(tunnel_url=None, require_min_connections=1, cfd_logs=None):
|
||||||
try:
|
try:
|
||||||
|
@ -95,13 +106,14 @@ def inner_wait_tunnel_ready(tunnel_url=None, require_min_connections=1):
|
||||||
with requests.Session() as s:
|
with requests.Session() as s:
|
||||||
resp = send_request(s, metrics_url, True)
|
resp = send_request(s, metrics_url, True)
|
||||||
|
|
||||||
assert resp.json()["readyConnections"] >= require_min_connections, \
|
ready_connections = resp.json()["readyConnections"]
|
||||||
|
|
||||||
|
assert ready_connections >= require_min_connections, \
|
||||||
f"Ready endpoint returned {resp.json()} but we expect at least {require_min_connections} connections"
|
f"Ready endpoint returned {resp.json()} but we expect at least {require_min_connections} connections"
|
||||||
|
|
||||||
if tunnel_url is not None:
|
if tunnel_url is not None:
|
||||||
send_request(s, tunnel_url, True)
|
send_request(s, tunnel_url, True)
|
||||||
|
|
||||||
|
|
||||||
def _log_cloudflared_logs(cfd_logs):
|
def _log_cloudflared_logs(cfd_logs):
|
||||||
log_file = cfd_logs
|
log_file = cfd_logs
|
||||||
if os.path.isdir(cfd_logs):
|
if os.path.isdir(cfd_logs):
|
||||||
|
|
|
@ -39,8 +39,6 @@ var (
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
DefaultCredentialFile = "cert.pem"
|
|
||||||
|
|
||||||
// BastionFlag is to enable bastion, or jump host, operation
|
// BastionFlag is to enable bastion, or jump host, operation
|
||||||
BastionFlag = "bastion"
|
BastionFlag = "bastion"
|
||||||
)
|
)
|
||||||
|
@ -391,7 +389,8 @@ func ReadConfigFile(c *cli.Context, log *zerolog.Logger) (settings *configFileSe
|
||||||
log.Debug().Msgf("Loading configuration from %s", configFile)
|
log.Debug().Msgf("Loading configuration from %s", configFile)
|
||||||
file, err := os.Open(configFile)
|
file, err := os.Open(configFile)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if os.IsNotExist(err) {
|
// If does not exist and config file was not specificly specified then return ErrNoConfigFile found.
|
||||||
|
if os.IsNotExist(err) && !c.IsSet("config") {
|
||||||
err = ErrNoConfigFile
|
err = ErrNoConfigFile
|
||||||
}
|
}
|
||||||
return nil, "", err
|
return nil, "", err
|
||||||
|
|
|
@ -6,6 +6,7 @@ import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
"math"
|
"math"
|
||||||
|
"net"
|
||||||
"net/http"
|
"net/http"
|
||||||
"strconv"
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
|
@ -142,6 +143,7 @@ type TCPRequest struct {
|
||||||
LBProbe bool
|
LBProbe bool
|
||||||
FlowID string
|
FlowID string
|
||||||
CfTraceID string
|
CfTraceID string
|
||||||
|
ConnIndex uint8
|
||||||
}
|
}
|
||||||
|
|
||||||
// ReadWriteAcker is a readwriter with the ability to Acknowledge to the downstream (edge) that the origin has
|
// ReadWriteAcker is a readwriter with the ability to Acknowledge to the downstream (edge) that the origin has
|
||||||
|
@ -196,9 +198,55 @@ func (h *HTTPResponseReadWriteAcker) AckConnection(tracePropagation string) erro
|
||||||
return h.w.WriteRespHeaders(resp.StatusCode, resp.Header)
|
return h.w.WriteRespHeaders(resp.StatusCode, resp.Header)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// localProxyConnection emulates an incoming connection to cloudflared as a net.Conn.
|
||||||
|
// Used when handling a "hijacked" connection from connection.ResponseWriter
|
||||||
|
type localProxyConnection struct {
|
||||||
|
io.ReadWriteCloser
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *localProxyConnection) Read(b []byte) (int, error) {
|
||||||
|
return c.ReadWriteCloser.Read(b)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *localProxyConnection) Write(b []byte) (int, error) {
|
||||||
|
return c.ReadWriteCloser.Write(b)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *localProxyConnection) Close() error {
|
||||||
|
return c.ReadWriteCloser.Close()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *localProxyConnection) LocalAddr() net.Addr {
|
||||||
|
// Unused LocalAddr
|
||||||
|
return &net.TCPAddr{IP: net.IPv6loopback, Port: 0, Zone: ""}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *localProxyConnection) RemoteAddr() net.Addr {
|
||||||
|
// Unused RemoteAddr
|
||||||
|
return &net.TCPAddr{IP: net.IPv6loopback, Port: 0, Zone: ""}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *localProxyConnection) SetDeadline(t time.Time) error {
|
||||||
|
// ignored since we can't set the read/write Deadlines for the tunnel back to origintunneld
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *localProxyConnection) SetReadDeadline(t time.Time) error {
|
||||||
|
// ignored since we can't set the read/write Deadlines for the tunnel back to origintunneld
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *localProxyConnection) SetWriteDeadline(t time.Time) error {
|
||||||
|
// ignored since we can't set the read/write Deadlines for the tunnel back to origintunneld
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// ResponseWriter is the response path for a request back through cloudflared's tunnel.
|
||||||
type ResponseWriter interface {
|
type ResponseWriter interface {
|
||||||
WriteRespHeaders(status int, header http.Header) error
|
WriteRespHeaders(status int, header http.Header) error
|
||||||
AddTrailer(trailerName, trailerValue string)
|
AddTrailer(trailerName, trailerValue string)
|
||||||
|
http.ResponseWriter
|
||||||
|
http.Hijacker
|
||||||
io.Writer
|
io.Writer
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -10,6 +10,7 @@ import (
|
||||||
|
|
||||||
"github.com/rs/zerolog"
|
"github.com/rs/zerolog"
|
||||||
|
|
||||||
|
"github.com/cloudflare/cloudflared/stream"
|
||||||
"github.com/cloudflare/cloudflared/tracing"
|
"github.com/cloudflare/cloudflared/tracing"
|
||||||
tunnelpogs "github.com/cloudflare/cloudflared/tunnelrpc/pogs"
|
tunnelpogs "github.com/cloudflare/cloudflared/tunnelrpc/pogs"
|
||||||
"github.com/cloudflare/cloudflared/websocket"
|
"github.com/cloudflare/cloudflared/websocket"
|
||||||
|
@ -140,7 +141,7 @@ func wsEchoEndpoint(w ResponseWriter, r *http.Request) error {
|
||||||
}()
|
}()
|
||||||
|
|
||||||
originConn := &echoPipe{reader: readPipe, writer: writePipe}
|
originConn := &echoPipe{reader: readPipe, writer: writePipe}
|
||||||
websocket.Stream(wsConn, originConn, &log)
|
stream.Pipe(wsConn, originConn, &log)
|
||||||
cancel()
|
cancel()
|
||||||
wsConn.Close()
|
wsConn.Close()
|
||||||
return nil
|
return nil
|
||||||
|
@ -178,7 +179,7 @@ func wsFlakyEndpoint(w ResponseWriter, r *http.Request) error {
|
||||||
|
|
||||||
closedAfter := time.Millisecond * time.Duration(rand.Intn(50))
|
closedAfter := time.Millisecond * time.Duration(rand.Intn(50))
|
||||||
originConn := &flakyConn{closeAt: time.Now().Add(closedAfter)}
|
originConn := &flakyConn{closeAt: time.Now().Add(closedAfter)}
|
||||||
websocket.Stream(wsConn, originConn, &log)
|
stream.Pipe(wsConn, originConn, &log)
|
||||||
cancel()
|
cancel()
|
||||||
wsConn.Close()
|
wsConn.Close()
|
||||||
return nil
|
return nil
|
||||||
|
|
|
@ -2,13 +2,13 @@ package connection
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"fmt"
|
|
||||||
"io"
|
"io"
|
||||||
"net"
|
"net"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/rs/zerolog"
|
"github.com/rs/zerolog"
|
||||||
|
|
||||||
|
"github.com/cloudflare/cloudflared/management"
|
||||||
tunnelpogs "github.com/cloudflare/cloudflared/tunnelrpc/pogs"
|
tunnelpogs "github.com/cloudflare/cloudflared/tunnelrpc/pogs"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -85,7 +85,7 @@ func (c *controlStream) ServeControlStream(
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
c.observer.logServerInfo(c.connIndex, registrationDetails.Location, c.edgeAddress, fmt.Sprintf("Connection %s registered", registrationDetails.UUID))
|
c.observer.logConnected(registrationDetails.UUID, c.connIndex, registrationDetails.Location, c.edgeAddress, c.protocol)
|
||||||
c.observer.sendConnectedEvent(c.connIndex, c.protocol, registrationDetails.Location)
|
c.observer.sendConnectedEvent(c.connIndex, c.protocol, registrationDetails.Location)
|
||||||
c.connectedFuse.Connected()
|
c.connectedFuse.Connected()
|
||||||
|
|
||||||
|
@ -116,7 +116,11 @@ func (c *controlStream) waitForUnregister(ctx context.Context, rpcClient NamedTu
|
||||||
|
|
||||||
c.observer.sendUnregisteringEvent(c.connIndex)
|
c.observer.sendUnregisteringEvent(c.connIndex)
|
||||||
rpcClient.GracefulShutdown(ctx, c.gracePeriod)
|
rpcClient.GracefulShutdown(ctx, c.gracePeriod)
|
||||||
c.observer.log.Info().Uint8(LogFieldConnIndex, c.connIndex).Msg("Unregistered tunnel connection")
|
c.observer.log.Info().
|
||||||
|
Int(management.EventTypeKey, int(management.Cloudflared)).
|
||||||
|
Uint8(LogFieldConnIndex, c.connIndex).
|
||||||
|
IPAddr(LogFieldIPAddress, c.edgeAddress).
|
||||||
|
Msg("Unregistered tunnel connection")
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *controlStream) IsStopped() bool {
|
func (c *controlStream) IsStopped() bool {
|
||||||
|
|
|
@ -1,46 +1,17 @@
|
||||||
package connection
|
package connection
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
|
||||||
"io"
|
|
||||||
"net"
|
|
||||||
"net/http"
|
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/pkg/errors"
|
|
||||||
"github.com/rs/zerolog"
|
"github.com/rs/zerolog"
|
||||||
"golang.org/x/sync/errgroup"
|
|
||||||
|
|
||||||
"github.com/cloudflare/cloudflared/h2mux"
|
"github.com/cloudflare/cloudflared/h2mux"
|
||||||
"github.com/cloudflare/cloudflared/tracing"
|
|
||||||
tunnelpogs "github.com/cloudflare/cloudflared/tunnelrpc/pogs"
|
|
||||||
"github.com/cloudflare/cloudflared/websocket"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
muxerTimeout = 5 * time.Second
|
muxerTimeout = 5 * time.Second
|
||||||
openStreamTimeout = 30 * time.Second
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type h2muxConnection struct {
|
|
||||||
orchestrator Orchestrator
|
|
||||||
gracePeriod time.Duration
|
|
||||||
muxerConfig *MuxerConfig
|
|
||||||
muxer *h2mux.Muxer
|
|
||||||
// connectionID is only used by metrics, and prometheus requires labels to be string
|
|
||||||
connIndexStr string
|
|
||||||
connIndex uint8
|
|
||||||
|
|
||||||
observer *Observer
|
|
||||||
gracefulShutdownC <-chan struct{}
|
|
||||||
stoppedGracefully bool
|
|
||||||
|
|
||||||
log *zerolog.Logger
|
|
||||||
|
|
||||||
// newRPCClientFunc allows us to mock RPCs during testing
|
|
||||||
newRPCClientFunc func(context.Context, io.ReadWriteCloser, *zerolog.Logger) NamedTunnelRPCClient
|
|
||||||
}
|
|
||||||
|
|
||||||
type MuxerConfig struct {
|
type MuxerConfig struct {
|
||||||
HeartbeatInterval time.Duration
|
HeartbeatInterval time.Duration
|
||||||
MaxHeartbeats uint64
|
MaxHeartbeats uint64
|
||||||
|
@ -59,220 +30,3 @@ func (mc *MuxerConfig) H2MuxerConfig(h h2mux.MuxedStreamHandler, log *zerolog.Lo
|
||||||
CompressionQuality: mc.CompressionSetting,
|
CompressionQuality: mc.CompressionSetting,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewTunnelHandler returns a TunnelHandler, origin LAN IP and error
|
|
||||||
func NewH2muxConnection(
|
|
||||||
orchestrator Orchestrator,
|
|
||||||
gracePeriod time.Duration,
|
|
||||||
muxerConfig *MuxerConfig,
|
|
||||||
edgeConn net.Conn,
|
|
||||||
connIndex uint8,
|
|
||||||
observer *Observer,
|
|
||||||
gracefulShutdownC <-chan struct{},
|
|
||||||
log *zerolog.Logger,
|
|
||||||
) (*h2muxConnection, error, bool) {
|
|
||||||
h := &h2muxConnection{
|
|
||||||
orchestrator: orchestrator,
|
|
||||||
gracePeriod: gracePeriod,
|
|
||||||
muxerConfig: muxerConfig,
|
|
||||||
connIndexStr: uint8ToString(connIndex),
|
|
||||||
connIndex: connIndex,
|
|
||||||
observer: observer,
|
|
||||||
gracefulShutdownC: gracefulShutdownC,
|
|
||||||
newRPCClientFunc: newRegistrationRPCClient,
|
|
||||||
log: log,
|
|
||||||
}
|
|
||||||
|
|
||||||
// Establish a muxed connection with the edge
|
|
||||||
// Client mux handshake with agent server
|
|
||||||
muxer, err := h2mux.Handshake(edgeConn, edgeConn, *muxerConfig.H2MuxerConfig(h, observer.logTransport), h2mux.ActiveStreams)
|
|
||||||
if err != nil {
|
|
||||||
recoverable := isHandshakeErrRecoverable(err, connIndex, observer)
|
|
||||||
return nil, err, recoverable
|
|
||||||
}
|
|
||||||
h.muxer = muxer
|
|
||||||
return h, nil, false
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *h2muxConnection) ServeNamedTunnel(ctx context.Context, namedTunnel *NamedTunnelProperties, connOptions *tunnelpogs.ConnectionOptions, connectedFuse ConnectedFuse) error {
|
|
||||||
errGroup, serveCtx := errgroup.WithContext(ctx)
|
|
||||||
errGroup.Go(func() error {
|
|
||||||
return h.serveMuxer(serveCtx)
|
|
||||||
})
|
|
||||||
|
|
||||||
errGroup.Go(func() error {
|
|
||||||
if err := h.registerNamedTunnel(serveCtx, namedTunnel, connOptions); err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
connectedFuse.Connected()
|
|
||||||
return nil
|
|
||||||
})
|
|
||||||
|
|
||||||
errGroup.Go(func() error {
|
|
||||||
h.controlLoop(serveCtx, connectedFuse, true)
|
|
||||||
return nil
|
|
||||||
})
|
|
||||||
|
|
||||||
err := errGroup.Wait()
|
|
||||||
if err == errMuxerStopped {
|
|
||||||
if h.stoppedGracefully {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
h.observer.log.Info().Uint8(LogFieldConnIndex, h.connIndex).Msg("Unexpected muxer shutdown")
|
|
||||||
}
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *h2muxConnection) ServeClassicTunnel(ctx context.Context, classicTunnel *ClassicTunnelProperties, credentialManager CredentialManager, registrationOptions *tunnelpogs.RegistrationOptions, connectedFuse ConnectedFuse) error {
|
|
||||||
errGroup, serveCtx := errgroup.WithContext(ctx)
|
|
||||||
errGroup.Go(func() error {
|
|
||||||
return h.serveMuxer(serveCtx)
|
|
||||||
})
|
|
||||||
|
|
||||||
errGroup.Go(func() (err error) {
|
|
||||||
defer func() {
|
|
||||||
if err == nil {
|
|
||||||
connectedFuse.Connected()
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
if classicTunnel.UseReconnectToken && connectedFuse.IsConnected() {
|
|
||||||
err := h.reconnectTunnel(ctx, credentialManager, classicTunnel, registrationOptions)
|
|
||||||
if err == nil {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
// log errors and proceed to RegisterTunnel
|
|
||||||
h.observer.log.Err(err).
|
|
||||||
Uint8(LogFieldConnIndex, h.connIndex).
|
|
||||||
Msg("Couldn't reconnect connection. Re-registering it instead.")
|
|
||||||
}
|
|
||||||
return h.registerTunnel(ctx, credentialManager, classicTunnel, registrationOptions)
|
|
||||||
})
|
|
||||||
|
|
||||||
errGroup.Go(func() error {
|
|
||||||
h.controlLoop(serveCtx, connectedFuse, false)
|
|
||||||
return nil
|
|
||||||
})
|
|
||||||
|
|
||||||
err := errGroup.Wait()
|
|
||||||
if err == errMuxerStopped {
|
|
||||||
if h.stoppedGracefully {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
h.observer.log.Info().Uint8(LogFieldConnIndex, h.connIndex).Msg("Unexpected muxer shutdown")
|
|
||||||
}
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *h2muxConnection) serveMuxer(ctx context.Context) error {
|
|
||||||
// All routines should stop when muxer finish serving. When muxer is shutdown
|
|
||||||
// gracefully, it doesn't return an error, so we need to return errMuxerShutdown
|
|
||||||
// here to notify other routines to stop
|
|
||||||
err := h.muxer.Serve(ctx)
|
|
||||||
if err == nil {
|
|
||||||
return errMuxerStopped
|
|
||||||
}
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *h2muxConnection) controlLoop(ctx context.Context, connectedFuse ConnectedFuse, isNamedTunnel bool) {
|
|
||||||
updateMetricsTicker := time.NewTicker(h.muxerConfig.MetricsUpdateFreq)
|
|
||||||
defer updateMetricsTicker.Stop()
|
|
||||||
var shutdownCompleted <-chan struct{}
|
|
||||||
for {
|
|
||||||
select {
|
|
||||||
case <-h.gracefulShutdownC:
|
|
||||||
if connectedFuse.IsConnected() {
|
|
||||||
h.unregister(isNamedTunnel)
|
|
||||||
}
|
|
||||||
h.stoppedGracefully = true
|
|
||||||
h.gracefulShutdownC = nil
|
|
||||||
shutdownCompleted = h.muxer.Shutdown()
|
|
||||||
|
|
||||||
case <-shutdownCompleted:
|
|
||||||
return
|
|
||||||
|
|
||||||
case <-ctx.Done():
|
|
||||||
// UnregisterTunnel blocks until the RPC call returns
|
|
||||||
if !h.stoppedGracefully && connectedFuse.IsConnected() {
|
|
||||||
h.unregister(isNamedTunnel)
|
|
||||||
}
|
|
||||||
h.muxer.Shutdown()
|
|
||||||
// don't wait for shutdown to finish when context is closed, this is the hard termination path
|
|
||||||
return
|
|
||||||
|
|
||||||
case <-updateMetricsTicker.C:
|
|
||||||
h.observer.metrics.updateMuxerMetrics(h.connIndexStr, h.muxer.Metrics())
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *h2muxConnection) newRPCStream(ctx context.Context, rpcName rpcName) (*h2mux.MuxedStream, error) {
|
|
||||||
openStreamCtx, openStreamCancel := context.WithTimeout(ctx, openStreamTimeout)
|
|
||||||
defer openStreamCancel()
|
|
||||||
stream, err := h.muxer.OpenRPCStream(openStreamCtx)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
return stream, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *h2muxConnection) ServeStream(stream *h2mux.MuxedStream) error {
|
|
||||||
respWriter := &h2muxRespWriter{stream}
|
|
||||||
|
|
||||||
req, reqErr := h.newRequest(stream)
|
|
||||||
if reqErr != nil {
|
|
||||||
respWriter.WriteErrorResponse()
|
|
||||||
return reqErr
|
|
||||||
}
|
|
||||||
|
|
||||||
var sourceConnectionType = TypeHTTP
|
|
||||||
if websocket.IsWebSocketUpgrade(req) {
|
|
||||||
sourceConnectionType = TypeWebsocket
|
|
||||||
}
|
|
||||||
|
|
||||||
originProxy, err := h.orchestrator.GetOriginProxy()
|
|
||||||
if err != nil {
|
|
||||||
respWriter.WriteErrorResponse()
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
err = originProxy.ProxyHTTP(respWriter, tracing.NewTracedHTTPRequest(req, h.log), sourceConnectionType == TypeWebsocket)
|
|
||||||
if err != nil {
|
|
||||||
respWriter.WriteErrorResponse()
|
|
||||||
}
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *h2muxConnection) newRequest(stream *h2mux.MuxedStream) (*http.Request, error) {
|
|
||||||
req, err := http.NewRequest("GET", "http://localhost:8080", h2mux.MuxedStreamReader{MuxedStream: stream})
|
|
||||||
if err != nil {
|
|
||||||
return nil, errors.Wrap(err, "Unexpected error from http.NewRequest")
|
|
||||||
}
|
|
||||||
err = H2RequestHeadersToH1Request(stream.Headers, req)
|
|
||||||
if err != nil {
|
|
||||||
return nil, errors.Wrap(err, "invalid request received")
|
|
||||||
}
|
|
||||||
return req, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
type h2muxRespWriter struct {
|
|
||||||
*h2mux.MuxedStream
|
|
||||||
}
|
|
||||||
|
|
||||||
func (rp *h2muxRespWriter) AddTrailer(trailerName, trailerValue string) {
|
|
||||||
// do nothing. we don't support trailers over h2mux
|
|
||||||
}
|
|
||||||
|
|
||||||
func (rp *h2muxRespWriter) WriteRespHeaders(status int, header http.Header) error {
|
|
||||||
headers := H1ResponseToH2ResponseHeaders(status, header)
|
|
||||||
headers = append(headers, h2mux.Header{Name: ResponseMetaHeader, Value: responseMetaHeaderOrigin})
|
|
||||||
return rp.WriteHeaders(headers)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (rp *h2muxRespWriter) WriteErrorResponse() {
|
|
||||||
_ = rp.WriteHeaders([]h2mux.Header{
|
|
||||||
{Name: ":status", Value: "502"},
|
|
||||||
{Name: ResponseMetaHeader, Value: responseMetaHeaderCfd},
|
|
||||||
})
|
|
||||||
_, _ = rp.Write([]byte("502 Bad Gateway"))
|
|
||||||
}
|
|
||||||
|
|
|
@ -1,301 +0,0 @@
|
||||||
package connection
|
|
||||||
|
|
||||||
import (
|
|
||||||
"context"
|
|
||||||
"fmt"
|
|
||||||
"io"
|
|
||||||
"net"
|
|
||||||
"net/http"
|
|
||||||
"strconv"
|
|
||||||
"sync"
|
|
||||||
"testing"
|
|
||||||
"time"
|
|
||||||
|
|
||||||
"github.com/gobwas/ws/wsutil"
|
|
||||||
"github.com/rs/zerolog"
|
|
||||||
"github.com/stretchr/testify/assert"
|
|
||||||
"github.com/stretchr/testify/require"
|
|
||||||
|
|
||||||
"github.com/cloudflare/cloudflared/h2mux"
|
|
||||||
)
|
|
||||||
|
|
||||||
var (
|
|
||||||
testMuxerConfig = &MuxerConfig{
|
|
||||||
HeartbeatInterval: time.Second * 5,
|
|
||||||
MaxHeartbeats: 5,
|
|
||||||
CompressionSetting: 0,
|
|
||||||
MetricsUpdateFreq: time.Second * 5,
|
|
||||||
}
|
|
||||||
)
|
|
||||||
|
|
||||||
func newH2MuxConnection(t require.TestingT) (*h2muxConnection, *h2mux.Muxer) {
|
|
||||||
edgeConn, originConn := net.Pipe()
|
|
||||||
edgeMuxChan := make(chan *h2mux.Muxer)
|
|
||||||
go func() {
|
|
||||||
edgeMuxConfig := h2mux.MuxerConfig{
|
|
||||||
Log: &log,
|
|
||||||
Handler: h2mux.MuxedStreamFunc(func(stream *h2mux.MuxedStream) error {
|
|
||||||
// we only expect RPC traffic in client->edge direction, provide minimal support for mocking
|
|
||||||
require.True(t, stream.IsRPCStream())
|
|
||||||
return stream.WriteHeaders([]h2mux.Header{
|
|
||||||
{Name: ":status", Value: "200"},
|
|
||||||
})
|
|
||||||
}),
|
|
||||||
}
|
|
||||||
edgeMux, err := h2mux.Handshake(edgeConn, edgeConn, edgeMuxConfig, h2mux.ActiveStreams)
|
|
||||||
require.NoError(t, err)
|
|
||||||
edgeMuxChan <- edgeMux
|
|
||||||
}()
|
|
||||||
var connIndex = uint8(0)
|
|
||||||
testObserver := NewObserver(&log, &log)
|
|
||||||
h2muxConn, err, _ := NewH2muxConnection(testOrchestrator, testGracePeriod, testMuxerConfig, originConn, connIndex, testObserver, nil, &log)
|
|
||||||
require.NoError(t, err)
|
|
||||||
return h2muxConn, <-edgeMuxChan
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestServeStreamHTTP(t *testing.T) {
|
|
||||||
tests := []testRequest{
|
|
||||||
{
|
|
||||||
name: "ok",
|
|
||||||
endpoint: "/ok",
|
|
||||||
expectedStatus: http.StatusOK,
|
|
||||||
expectedBody: []byte(http.StatusText(http.StatusOK)),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "large_file",
|
|
||||||
endpoint: "/large_file",
|
|
||||||
expectedStatus: http.StatusOK,
|
|
||||||
expectedBody: testLargeResp,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "Bad request",
|
|
||||||
endpoint: "/400",
|
|
||||||
expectedStatus: http.StatusBadRequest,
|
|
||||||
expectedBody: []byte(http.StatusText(http.StatusBadRequest)),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "Internal server error",
|
|
||||||
endpoint: "/500",
|
|
||||||
expectedStatus: http.StatusInternalServerError,
|
|
||||||
expectedBody: []byte(http.StatusText(http.StatusInternalServerError)),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "Proxy error",
|
|
||||||
endpoint: "/error",
|
|
||||||
expectedStatus: http.StatusBadGateway,
|
|
||||||
expectedBody: nil,
|
|
||||||
isProxyError: true,
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
ctx, cancel := context.WithCancel(context.Background())
|
|
||||||
h2muxConn, edgeMux := newH2MuxConnection(t)
|
|
||||||
|
|
||||||
var wg sync.WaitGroup
|
|
||||||
wg.Add(2)
|
|
||||||
go func() {
|
|
||||||
defer wg.Done()
|
|
||||||
_ = edgeMux.Serve(ctx)
|
|
||||||
}()
|
|
||||||
go func() {
|
|
||||||
defer wg.Done()
|
|
||||||
err := h2muxConn.serveMuxer(ctx)
|
|
||||||
require.Error(t, err)
|
|
||||||
}()
|
|
||||||
|
|
||||||
for _, test := range tests {
|
|
||||||
headers := []h2mux.Header{
|
|
||||||
{
|
|
||||||
Name: ":path",
|
|
||||||
Value: test.endpoint,
|
|
||||||
},
|
|
||||||
}
|
|
||||||
stream, err := edgeMux.OpenStream(ctx, headers, nil)
|
|
||||||
require.NoError(t, err)
|
|
||||||
require.True(t, hasHeader(stream, ":status", strconv.Itoa(test.expectedStatus)))
|
|
||||||
|
|
||||||
if test.isProxyError {
|
|
||||||
assert.True(t, hasHeader(stream, ResponseMetaHeader, responseMetaHeaderCfd))
|
|
||||||
} else {
|
|
||||||
assert.True(t, hasHeader(stream, ResponseMetaHeader, responseMetaHeaderOrigin))
|
|
||||||
body := make([]byte, len(test.expectedBody))
|
|
||||||
_, err = stream.Read(body)
|
|
||||||
require.NoError(t, err)
|
|
||||||
require.Equal(t, test.expectedBody, body)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
cancel()
|
|
||||||
wg.Wait()
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestServeStreamWS(t *testing.T) {
|
|
||||||
ctx, cancel := context.WithCancel(context.Background())
|
|
||||||
h2muxConn, edgeMux := newH2MuxConnection(t)
|
|
||||||
|
|
||||||
var wg sync.WaitGroup
|
|
||||||
wg.Add(2)
|
|
||||||
go func() {
|
|
||||||
defer wg.Done()
|
|
||||||
edgeMux.Serve(ctx)
|
|
||||||
}()
|
|
||||||
go func() {
|
|
||||||
defer wg.Done()
|
|
||||||
err := h2muxConn.serveMuxer(ctx)
|
|
||||||
require.Error(t, err)
|
|
||||||
}()
|
|
||||||
|
|
||||||
headers := []h2mux.Header{
|
|
||||||
{
|
|
||||||
Name: ":path",
|
|
||||||
Value: "/ws/echo",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
Name: "connection",
|
|
||||||
Value: "upgrade",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
Name: "upgrade",
|
|
||||||
Value: "websocket",
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
readPipe, writePipe := io.Pipe()
|
|
||||||
stream, err := edgeMux.OpenStream(ctx, headers, readPipe)
|
|
||||||
require.NoError(t, err)
|
|
||||||
|
|
||||||
require.True(t, hasHeader(stream, ":status", strconv.Itoa(http.StatusSwitchingProtocols)))
|
|
||||||
assert.True(t, hasHeader(stream, ResponseMetaHeader, responseMetaHeaderOrigin))
|
|
||||||
|
|
||||||
data := []byte("test websocket")
|
|
||||||
err = wsutil.WriteClientBinary(writePipe, data)
|
|
||||||
require.NoError(t, err)
|
|
||||||
|
|
||||||
respBody, err := wsutil.ReadServerBinary(stream)
|
|
||||||
require.NoError(t, err)
|
|
||||||
require.Equal(t, data, respBody, fmt.Sprintf("Expect %s, got %s", string(data), string(respBody)))
|
|
||||||
|
|
||||||
cancel()
|
|
||||||
wg.Wait()
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestGracefulShutdownH2Mux(t *testing.T) {
|
|
||||||
ctx, cancel := context.WithCancel(context.Background())
|
|
||||||
defer cancel()
|
|
||||||
|
|
||||||
h2muxConn, edgeMux := newH2MuxConnection(t)
|
|
||||||
|
|
||||||
shutdownC := make(chan struct{})
|
|
||||||
unregisteredC := make(chan struct{})
|
|
||||||
h2muxConn.gracefulShutdownC = shutdownC
|
|
||||||
h2muxConn.newRPCClientFunc = func(_ context.Context, _ io.ReadWriteCloser, _ *zerolog.Logger) NamedTunnelRPCClient {
|
|
||||||
return &mockNamedTunnelRPCClient{
|
|
||||||
registered: nil,
|
|
||||||
unregistered: unregisteredC,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
var wg sync.WaitGroup
|
|
||||||
wg.Add(3)
|
|
||||||
go func() {
|
|
||||||
defer wg.Done()
|
|
||||||
_ = edgeMux.Serve(ctx)
|
|
||||||
}()
|
|
||||||
go func() {
|
|
||||||
defer wg.Done()
|
|
||||||
_ = h2muxConn.serveMuxer(ctx)
|
|
||||||
}()
|
|
||||||
|
|
||||||
go func() {
|
|
||||||
defer wg.Done()
|
|
||||||
h2muxConn.controlLoop(ctx, &mockConnectedFuse{}, true)
|
|
||||||
}()
|
|
||||||
|
|
||||||
time.Sleep(100 * time.Millisecond)
|
|
||||||
close(shutdownC)
|
|
||||||
|
|
||||||
select {
|
|
||||||
case <-unregisteredC:
|
|
||||||
break // ok
|
|
||||||
case <-time.Tick(time.Second):
|
|
||||||
assert.Fail(t, "timed out waiting for control loop to unregister")
|
|
||||||
}
|
|
||||||
|
|
||||||
cancel()
|
|
||||||
wg.Wait()
|
|
||||||
|
|
||||||
assert.True(t, h2muxConn.stoppedGracefully)
|
|
||||||
assert.Nil(t, h2muxConn.gracefulShutdownC)
|
|
||||||
}
|
|
||||||
|
|
||||||
func hasHeader(stream *h2mux.MuxedStream, name, val string) bool {
|
|
||||||
for _, header := range stream.Headers {
|
|
||||||
if header.Name == name && header.Value == val {
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
|
||||||
func benchmarkServeStreamHTTPSimple(b *testing.B, test testRequest) {
|
|
||||||
ctx, cancel := context.WithCancel(context.Background())
|
|
||||||
h2muxConn, edgeMux := newH2MuxConnection(b)
|
|
||||||
|
|
||||||
var wg sync.WaitGroup
|
|
||||||
wg.Add(2)
|
|
||||||
go func() {
|
|
||||||
defer wg.Done()
|
|
||||||
edgeMux.Serve(ctx)
|
|
||||||
}()
|
|
||||||
go func() {
|
|
||||||
defer wg.Done()
|
|
||||||
err := h2muxConn.serveMuxer(ctx)
|
|
||||||
require.Error(b, err)
|
|
||||||
}()
|
|
||||||
|
|
||||||
headers := []h2mux.Header{
|
|
||||||
{
|
|
||||||
Name: ":path",
|
|
||||||
Value: test.endpoint,
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
body := make([]byte, len(test.expectedBody))
|
|
||||||
b.ResetTimer()
|
|
||||||
for i := 0; i < b.N; i++ {
|
|
||||||
b.StartTimer()
|
|
||||||
stream, openstreamErr := edgeMux.OpenStream(ctx, headers, nil)
|
|
||||||
_, readBodyErr := stream.Read(body)
|
|
||||||
b.StopTimer()
|
|
||||||
|
|
||||||
require.NoError(b, openstreamErr)
|
|
||||||
assert.True(b, hasHeader(stream, ResponseMetaHeader, responseMetaHeaderOrigin))
|
|
||||||
require.True(b, hasHeader(stream, ":status", strconv.Itoa(http.StatusOK)))
|
|
||||||
require.NoError(b, readBodyErr)
|
|
||||||
require.Equal(b, test.expectedBody, body)
|
|
||||||
}
|
|
||||||
|
|
||||||
cancel()
|
|
||||||
wg.Wait()
|
|
||||||
}
|
|
||||||
|
|
||||||
func BenchmarkServeStreamHTTPSimple(b *testing.B) {
|
|
||||||
test := testRequest{
|
|
||||||
name: "ok",
|
|
||||||
endpoint: "/ok",
|
|
||||||
expectedStatus: http.StatusOK,
|
|
||||||
expectedBody: []byte(http.StatusText(http.StatusOK)),
|
|
||||||
}
|
|
||||||
|
|
||||||
benchmarkServeStreamHTTPSimple(b, test)
|
|
||||||
}
|
|
||||||
|
|
||||||
func BenchmarkServeStreamHTTPLargeFile(b *testing.B) {
|
|
||||||
test := testRequest{
|
|
||||||
name: "large_file",
|
|
||||||
endpoint: "/large_file",
|
|
||||||
expectedStatus: http.StatusOK,
|
|
||||||
expectedBody: testLargeResp,
|
|
||||||
}
|
|
||||||
|
|
||||||
benchmarkServeStreamHTTPSimple(b, test)
|
|
||||||
}
|
|
|
@ -1,6 +1,7 @@
|
||||||
package connection
|
package connection
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"bufio"
|
||||||
"context"
|
"context"
|
||||||
gojson "encoding/json"
|
gojson "encoding/json"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
@ -115,52 +116,53 @@ func (c *HTTP2Connection) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
var requestErr error
|
||||||
switch connType {
|
switch connType {
|
||||||
case TypeControlStream:
|
case TypeControlStream:
|
||||||
if err := c.controlStreamHandler.ServeControlStream(r.Context(), respWriter, c.connOptions, c.orchestrator); err != nil {
|
requestErr = c.controlStreamHandler.ServeControlStream(r.Context(), respWriter, c.connOptions, c.orchestrator)
|
||||||
c.controlStreamErr = err
|
if requestErr != nil {
|
||||||
c.log.Error().Err(err)
|
c.controlStreamErr = requestErr
|
||||||
respWriter.WriteErrorResponse()
|
|
||||||
}
|
}
|
||||||
|
|
||||||
case TypeConfiguration:
|
case TypeConfiguration:
|
||||||
if err := c.handleConfigurationUpdate(respWriter, r); err != nil {
|
requestErr = c.handleConfigurationUpdate(respWriter, r)
|
||||||
c.log.Error().Err(err)
|
|
||||||
respWriter.WriteErrorResponse()
|
|
||||||
}
|
|
||||||
|
|
||||||
case TypeWebsocket, TypeHTTP:
|
case TypeWebsocket, TypeHTTP:
|
||||||
stripWebsocketUpgradeHeader(r)
|
stripWebsocketUpgradeHeader(r)
|
||||||
// Check for tracing on request
|
// Check for tracing on request
|
||||||
tr := tracing.NewTracedHTTPRequest(r, c.log)
|
tr := tracing.NewTracedHTTPRequest(r, c.connIndex, c.log)
|
||||||
if err := originProxy.ProxyHTTP(respWriter, tr, connType == TypeWebsocket); err != nil {
|
if err := originProxy.ProxyHTTP(respWriter, tr, connType == TypeWebsocket); err != nil {
|
||||||
err := fmt.Errorf("Failed to proxy HTTP: %w", err)
|
requestErr = fmt.Errorf("Failed to proxy HTTP: %w", err)
|
||||||
c.log.Error().Err(err)
|
|
||||||
respWriter.WriteErrorResponse()
|
|
||||||
}
|
}
|
||||||
|
|
||||||
case TypeTCP:
|
case TypeTCP:
|
||||||
host, err := getRequestHost(r)
|
host, err := getRequestHost(r)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
err := fmt.Errorf(`cloudflared received a warp-routing request with an empty host value: %w`, err)
|
requestErr = fmt.Errorf(`cloudflared received a warp-routing request with an empty host value: %w`, err)
|
||||||
c.log.Error().Err(err)
|
break
|
||||||
respWriter.WriteErrorResponse()
|
|
||||||
}
|
}
|
||||||
|
|
||||||
rws := NewHTTPResponseReadWriterAcker(respWriter, r)
|
rws := NewHTTPResponseReadWriterAcker(respWriter, r)
|
||||||
if err := originProxy.ProxyTCP(r.Context(), rws, &TCPRequest{
|
requestErr = originProxy.ProxyTCP(r.Context(), rws, &TCPRequest{
|
||||||
Dest: host,
|
Dest: host,
|
||||||
CFRay: FindCfRayHeader(r),
|
CFRay: FindCfRayHeader(r),
|
||||||
LBProbe: IsLBProbeRequest(r),
|
LBProbe: IsLBProbeRequest(r),
|
||||||
CfTraceID: r.Header.Get(tracing.TracerContextName),
|
CfTraceID: r.Header.Get(tracing.TracerContextName),
|
||||||
}); err != nil {
|
ConnIndex: c.connIndex,
|
||||||
respWriter.WriteErrorResponse()
|
})
|
||||||
}
|
|
||||||
|
|
||||||
default:
|
default:
|
||||||
err := fmt.Errorf("Received unknown connection type: %s", connType)
|
requestErr = fmt.Errorf("Received unknown connection type: %s", connType)
|
||||||
c.log.Error().Err(err)
|
}
|
||||||
respWriter.WriteErrorResponse()
|
|
||||||
|
if requestErr != nil {
|
||||||
|
c.log.Error().Err(requestErr).Msg("failed to serve incoming request")
|
||||||
|
|
||||||
|
// WriteErrorResponse will return false if status was already written. we need to abort handler.
|
||||||
|
if !respWriter.WriteErrorResponse() {
|
||||||
|
c.log.Debug().Msg("Handler aborted due to failure to write error response after status already sent")
|
||||||
|
panic(http.ErrAbortHandler)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -196,6 +198,9 @@ type http2RespWriter struct {
|
||||||
flusher http.Flusher
|
flusher http.Flusher
|
||||||
shouldFlush bool
|
shouldFlush bool
|
||||||
statusWritten bool
|
statusWritten bool
|
||||||
|
respHeaders http.Header
|
||||||
|
hijackedMutex sync.Mutex
|
||||||
|
hijackedv bool
|
||||||
log *zerolog.Logger
|
log *zerolog.Logger
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -216,6 +221,7 @@ func NewHTTP2RespWriter(r *http.Request, w http.ResponseWriter, connType Type, l
|
||||||
w: w,
|
w: w,
|
||||||
flusher: flusher,
|
flusher: flusher,
|
||||||
shouldFlush: connType.shouldFlush(),
|
shouldFlush: connType.shouldFlush(),
|
||||||
|
respHeaders: make(http.Header),
|
||||||
log: log,
|
log: log,
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
@ -230,6 +236,10 @@ func (rp *http2RespWriter) AddTrailer(trailerName, trailerValue string) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func (rp *http2RespWriter) WriteRespHeaders(status int, header http.Header) error {
|
func (rp *http2RespWriter) WriteRespHeaders(status int, header http.Header) error {
|
||||||
|
if rp.hijacked() {
|
||||||
|
rp.log.Warn().Msg("WriteRespHeaders after hijack")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
dest := rp.w.Header()
|
dest := rp.w.Header()
|
||||||
userHeaders := make(http.Header, len(header))
|
userHeaders := make(http.Header, len(header))
|
||||||
for name, values := range header {
|
for name, values := range header {
|
||||||
|
@ -275,9 +285,58 @@ func (rp *http2RespWriter) WriteRespHeaders(status int, header http.Header) erro
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (rp *http2RespWriter) WriteErrorResponse() {
|
func (rp *http2RespWriter) Header() http.Header {
|
||||||
|
return rp.respHeaders
|
||||||
|
}
|
||||||
|
|
||||||
|
func (rp *http2RespWriter) WriteHeader(status int) {
|
||||||
|
if rp.hijacked() {
|
||||||
|
rp.log.Warn().Msg("WriteHeader after hijack")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
rp.WriteRespHeaders(status, rp.respHeaders)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (rp *http2RespWriter) hijacked() bool {
|
||||||
|
rp.hijackedMutex.Lock()
|
||||||
|
defer rp.hijackedMutex.Unlock()
|
||||||
|
return rp.hijackedv
|
||||||
|
}
|
||||||
|
|
||||||
|
func (rp *http2RespWriter) Hijack() (net.Conn, *bufio.ReadWriter, error) {
|
||||||
|
if !rp.statusWritten {
|
||||||
|
return nil, nil, fmt.Errorf("status not yet written before attempting to hijack connection")
|
||||||
|
}
|
||||||
|
// Make sure to flush anything left in the buffer before hijacking
|
||||||
|
if rp.shouldFlush {
|
||||||
|
rp.flusher.Flush()
|
||||||
|
}
|
||||||
|
rp.hijackedMutex.Lock()
|
||||||
|
defer rp.hijackedMutex.Unlock()
|
||||||
|
if rp.hijackedv {
|
||||||
|
return nil, nil, http.ErrHijacked
|
||||||
|
}
|
||||||
|
rp.hijackedv = true
|
||||||
|
conn := &localProxyConnection{rp}
|
||||||
|
// We return the http2RespWriter here because we want to make sure that we flush after every write
|
||||||
|
// otherwise the HTTP2 write buffer waits a few seconds before sending.
|
||||||
|
readWriter := bufio.NewReadWriter(
|
||||||
|
bufio.NewReader(rp),
|
||||||
|
bufio.NewWriter(rp),
|
||||||
|
)
|
||||||
|
return conn, readWriter, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (rp *http2RespWriter) WriteErrorResponse() bool {
|
||||||
|
if rp.statusWritten {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
rp.setResponseMetaHeader(responseMetaHeaderCfd)
|
rp.setResponseMetaHeader(responseMetaHeaderCfd)
|
||||||
rp.w.WriteHeader(http.StatusBadGateway)
|
rp.w.WriteHeader(http.StatusBadGateway)
|
||||||
|
rp.statusWritten = true
|
||||||
|
|
||||||
|
return true
|
||||||
}
|
}
|
||||||
|
|
||||||
func (rp *http2RespWriter) setResponseMetaHeader(value string) {
|
func (rp *http2RespWriter) setResponseMetaHeader(value string) {
|
||||||
|
|
|
@ -4,12 +4,17 @@ import (
|
||||||
"net"
|
"net"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
"github.com/rs/zerolog"
|
"github.com/rs/zerolog"
|
||||||
|
|
||||||
|
"github.com/cloudflare/cloudflared/management"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
LogFieldConnectionID = "connection"
|
||||||
LogFieldLocation = "location"
|
LogFieldLocation = "location"
|
||||||
LogFieldIPAddress = "ip"
|
LogFieldIPAddress = "ip"
|
||||||
|
LogFieldProtocol = "protocol"
|
||||||
observerChannelBufferSize = 16
|
observerChannelBufferSize = 16
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -41,13 +46,16 @@ func (o *Observer) RegisterSink(sink EventSink) {
|
||||||
o.addSinkChan <- sink
|
o.addSinkChan <- sink
|
||||||
}
|
}
|
||||||
|
|
||||||
func (o *Observer) logServerInfo(connIndex uint8, location string, address net.IP, msg string) {
|
func (o *Observer) logConnected(connectionID uuid.UUID, connIndex uint8, location string, address net.IP, protocol Protocol) {
|
||||||
o.sendEvent(Event{Index: connIndex, EventType: Connected, Location: location})
|
o.sendEvent(Event{Index: connIndex, EventType: Connected, Location: location})
|
||||||
o.log.Info().
|
o.log.Info().
|
||||||
|
Int(management.EventTypeKey, int(management.Cloudflared)).
|
||||||
|
Str(LogFieldConnectionID, connectionID.String()).
|
||||||
Uint8(LogFieldConnIndex, connIndex).
|
Uint8(LogFieldConnIndex, connIndex).
|
||||||
Str(LogFieldLocation, location).
|
Str(LogFieldLocation, location).
|
||||||
IPAddr(LogFieldIPAddress, address).
|
IPAddr(LogFieldIPAddress, address).
|
||||||
Msg(msg)
|
Str(LogFieldProtocol, protocol.String()).
|
||||||
|
Msg("Registered tunnel connection")
|
||||||
o.metrics.registerServerLocation(uint8ToString(connIndex), location)
|
o.metrics.registerServerLocation(uint8ToString(connIndex), location)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -1,7 +1,6 @@
|
||||||
package connection
|
package connection
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"errors"
|
|
||||||
"fmt"
|
"fmt"
|
||||||
"hash/fnv"
|
"hash/fnv"
|
||||||
"sync"
|
"sync"
|
||||||
|
@ -13,7 +12,7 @@ import (
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
AvailableProtocolFlagMessage = "Available protocols: 'auto' - automatically chooses the best protocol over time (the default; and also the recommended one); 'quic' - based on QUIC, relying on UDP egress to Cloudflare edge; 'http2' - using Go's HTTP2 library, relying on TCP egress to Cloudflare edge; 'h2mux' - Cloudflare's implementation of HTTP/2, deprecated"
|
AvailableProtocolFlagMessage = "Available protocols: 'auto' - automatically chooses the best protocol over time (the default; and also the recommended one); 'quic' - based on QUIC, relying on UDP egress to Cloudflare edge; 'http2' - using Go's HTTP2 library, relying on TCP egress to Cloudflare edge"
|
||||||
// edgeH2muxTLSServerName is the server name to establish h2mux connection with edge
|
// edgeH2muxTLSServerName is the server name to establish h2mux connection with edge
|
||||||
edgeH2muxTLSServerName = "cftunnel.com"
|
edgeH2muxTLSServerName = "cftunnel.com"
|
||||||
// edgeH2TLSServerName is the server name to establish http2 connection with edge
|
// edgeH2TLSServerName is the server name to establish http2 connection with edge
|
||||||
|
@ -21,43 +20,32 @@ const (
|
||||||
// edgeQUICServerName is the server name to establish quic connection with edge.
|
// edgeQUICServerName is the server name to establish quic connection with edge.
|
||||||
edgeQUICServerName = "quic.cftunnel.com"
|
edgeQUICServerName = "quic.cftunnel.com"
|
||||||
AutoSelectFlag = "auto"
|
AutoSelectFlag = "auto"
|
||||||
|
// SRV and TXT record resolution TTL
|
||||||
|
ResolveTTL = time.Hour
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
// ProtocolList represents a list of supported protocols for communication with the edge.
|
// ProtocolList represents a list of supported protocols for communication with the edge
|
||||||
ProtocolList = []Protocol{H2mux, HTTP2, HTTP2Warp, QUIC, QUICWarp}
|
// in order of precedence for remote percentage fetcher.
|
||||||
|
ProtocolList = []Protocol{QUIC, HTTP2}
|
||||||
)
|
)
|
||||||
|
|
||||||
type Protocol int64
|
type Protocol int64
|
||||||
|
|
||||||
const (
|
const (
|
||||||
// H2mux protocol can be used both with Classic and Named Tunnels. .
|
// HTTP2 using golang HTTP2 library for edge connections.
|
||||||
H2mux Protocol = iota
|
HTTP2 Protocol = iota
|
||||||
// HTTP2 is used only with named tunnels. It's more efficient than H2mux for L4 proxying.
|
// QUIC using quic-go for edge connections.
|
||||||
HTTP2
|
|
||||||
// QUIC is used only with named tunnels.
|
|
||||||
QUIC
|
QUIC
|
||||||
// HTTP2Warp is used only with named tunnels. It's useful for warp-routing where we don't want to fallback to
|
|
||||||
// H2mux on HTTP2 failure to connect.
|
|
||||||
HTTP2Warp
|
|
||||||
//QUICWarp is used only with named tunnels. It's useful for warp-routing where we want to fallback to HTTP2 but
|
|
||||||
// don't want HTTP2 to fallback to H2mux
|
|
||||||
QUICWarp
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// Fallback returns the fallback protocol and whether the protocol has a fallback
|
// Fallback returns the fallback protocol and whether the protocol has a fallback
|
||||||
func (p Protocol) fallback() (Protocol, bool) {
|
func (p Protocol) fallback() (Protocol, bool) {
|
||||||
switch p {
|
switch p {
|
||||||
case H2mux:
|
|
||||||
return 0, false
|
|
||||||
case HTTP2:
|
case HTTP2:
|
||||||
return H2mux, true
|
|
||||||
case HTTP2Warp:
|
|
||||||
return 0, false
|
return 0, false
|
||||||
case QUIC:
|
case QUIC:
|
||||||
return HTTP2, true
|
return HTTP2, true
|
||||||
case QUICWarp:
|
|
||||||
return HTTP2Warp, true
|
|
||||||
default:
|
default:
|
||||||
return 0, false
|
return 0, false
|
||||||
}
|
}
|
||||||
|
@ -65,11 +53,9 @@ func (p Protocol) fallback() (Protocol, bool) {
|
||||||
|
|
||||||
func (p Protocol) String() string {
|
func (p Protocol) String() string {
|
||||||
switch p {
|
switch p {
|
||||||
case H2mux:
|
case HTTP2:
|
||||||
return "h2mux"
|
|
||||||
case HTTP2, HTTP2Warp:
|
|
||||||
return "http2"
|
return "http2"
|
||||||
case QUIC, QUICWarp:
|
case QUIC:
|
||||||
return "quic"
|
return "quic"
|
||||||
default:
|
default:
|
||||||
return fmt.Sprintf("unknown protocol")
|
return fmt.Sprintf("unknown protocol")
|
||||||
|
@ -78,15 +64,11 @@ func (p Protocol) String() string {
|
||||||
|
|
||||||
func (p Protocol) TLSSettings() *TLSSettings {
|
func (p Protocol) TLSSettings() *TLSSettings {
|
||||||
switch p {
|
switch p {
|
||||||
case H2mux:
|
case HTTP2:
|
||||||
return &TLSSettings{
|
|
||||||
ServerName: edgeH2muxTLSServerName,
|
|
||||||
}
|
|
||||||
case HTTP2, HTTP2Warp:
|
|
||||||
return &TLSSettings{
|
return &TLSSettings{
|
||||||
ServerName: edgeH2TLSServerName,
|
ServerName: edgeH2TLSServerName,
|
||||||
}
|
}
|
||||||
case QUIC, QUICWarp:
|
case QUIC:
|
||||||
return &TLSSettings{
|
return &TLSSettings{
|
||||||
ServerName: edgeQUICServerName,
|
ServerName: edgeQUICServerName,
|
||||||
NextProtos: []string{"argotunnel"},
|
NextProtos: []string{"argotunnel"},
|
||||||
|
@ -106,6 +88,7 @@ type ProtocolSelector interface {
|
||||||
Fallback() (Protocol, bool)
|
Fallback() (Protocol, bool)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// staticProtocolSelector will not provide a different protocol for Fallback
|
||||||
type staticProtocolSelector struct {
|
type staticProtocolSelector struct {
|
||||||
current Protocol
|
current Protocol
|
||||||
}
|
}
|
||||||
|
@ -115,10 +98,11 @@ func (s *staticProtocolSelector) Current() Protocol {
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *staticProtocolSelector) Fallback() (Protocol, bool) {
|
func (s *staticProtocolSelector) Fallback() (Protocol, bool) {
|
||||||
return 0, false
|
return s.current, false
|
||||||
}
|
}
|
||||||
|
|
||||||
type autoProtocolSelector struct {
|
// remoteProtocolSelector will fetch a list of remote protocols to provide for edge discovery
|
||||||
|
type remoteProtocolSelector struct {
|
||||||
lock sync.RWMutex
|
lock sync.RWMutex
|
||||||
|
|
||||||
current Protocol
|
current Protocol
|
||||||
|
@ -127,23 +111,21 @@ type autoProtocolSelector struct {
|
||||||
protocolPool []Protocol
|
protocolPool []Protocol
|
||||||
|
|
||||||
switchThreshold int32
|
switchThreshold int32
|
||||||
fetchFunc PercentageFetcher
|
fetchFunc edgediscovery.PercentageFetcher
|
||||||
refreshAfter time.Time
|
refreshAfter time.Time
|
||||||
ttl time.Duration
|
ttl time.Duration
|
||||||
log *zerolog.Logger
|
log *zerolog.Logger
|
||||||
needPQ bool
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func newAutoProtocolSelector(
|
func newRemoteProtocolSelector(
|
||||||
current Protocol,
|
current Protocol,
|
||||||
protocolPool []Protocol,
|
protocolPool []Protocol,
|
||||||
switchThreshold int32,
|
switchThreshold int32,
|
||||||
fetchFunc PercentageFetcher,
|
fetchFunc edgediscovery.PercentageFetcher,
|
||||||
ttl time.Duration,
|
ttl time.Duration,
|
||||||
log *zerolog.Logger,
|
log *zerolog.Logger,
|
||||||
needPQ bool,
|
) *remoteProtocolSelector {
|
||||||
) *autoProtocolSelector {
|
return &remoteProtocolSelector{
|
||||||
return &autoProtocolSelector{
|
|
||||||
current: current,
|
current: current,
|
||||||
protocolPool: protocolPool,
|
protocolPool: protocolPool,
|
||||||
switchThreshold: switchThreshold,
|
switchThreshold: switchThreshold,
|
||||||
|
@ -151,11 +133,10 @@ func newAutoProtocolSelector(
|
||||||
refreshAfter: time.Now().Add(ttl),
|
refreshAfter: time.Now().Add(ttl),
|
||||||
ttl: ttl,
|
ttl: ttl,
|
||||||
log: log,
|
log: log,
|
||||||
needPQ: needPQ,
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *autoProtocolSelector) Current() Protocol {
|
func (s *remoteProtocolSelector) Current() Protocol {
|
||||||
s.lock.Lock()
|
s.lock.Lock()
|
||||||
defer s.lock.Unlock()
|
defer s.lock.Unlock()
|
||||||
if time.Now().Before(s.refreshAfter) {
|
if time.Now().Before(s.refreshAfter) {
|
||||||
|
@ -173,7 +154,13 @@ func (s *autoProtocolSelector) Current() Protocol {
|
||||||
return s.current
|
return s.current
|
||||||
}
|
}
|
||||||
|
|
||||||
func getProtocol(protocolPool []Protocol, fetchFunc PercentageFetcher, switchThreshold int32) (Protocol, error) {
|
func (s *remoteProtocolSelector) Fallback() (Protocol, bool) {
|
||||||
|
s.lock.RLock()
|
||||||
|
defer s.lock.RUnlock()
|
||||||
|
return s.current.fallback()
|
||||||
|
}
|
||||||
|
|
||||||
|
func getProtocol(protocolPool []Protocol, fetchFunc edgediscovery.PercentageFetcher, switchThreshold int32) (Protocol, error) {
|
||||||
protocolPercentages, err := fetchFunc()
|
protocolPercentages, err := fetchFunc()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return 0, err
|
return 0, err
|
||||||
|
@ -185,112 +172,78 @@ func getProtocol(protocolPool []Protocol, fetchFunc PercentageFetcher, switchThr
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return protocolPool[len(protocolPool)-1], nil
|
// Default to first index in protocolPool list
|
||||||
|
return protocolPool[0], nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *autoProtocolSelector) Fallback() (Protocol, bool) {
|
// defaultProtocolSelector will allow for a protocol to have a fallback
|
||||||
|
type defaultProtocolSelector struct {
|
||||||
|
lock sync.RWMutex
|
||||||
|
current Protocol
|
||||||
|
}
|
||||||
|
|
||||||
|
func newDefaultProtocolSelector(
|
||||||
|
current Protocol,
|
||||||
|
) *defaultProtocolSelector {
|
||||||
|
return &defaultProtocolSelector{
|
||||||
|
current: current,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *defaultProtocolSelector) Current() Protocol {
|
||||||
|
s.lock.Lock()
|
||||||
|
defer s.lock.Unlock()
|
||||||
|
return s.current
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *defaultProtocolSelector) Fallback() (Protocol, bool) {
|
||||||
s.lock.RLock()
|
s.lock.RLock()
|
||||||
defer s.lock.RUnlock()
|
defer s.lock.RUnlock()
|
||||||
if s.needPQ {
|
|
||||||
return 0, false
|
|
||||||
}
|
|
||||||
return s.current.fallback()
|
return s.current.fallback()
|
||||||
}
|
}
|
||||||
|
|
||||||
type PercentageFetcher func() (edgediscovery.ProtocolPercents, error)
|
|
||||||
|
|
||||||
func NewProtocolSelector(
|
func NewProtocolSelector(
|
||||||
protocolFlag string,
|
protocolFlag string,
|
||||||
warpRoutingEnabled bool,
|
accountTag string,
|
||||||
namedTunnel *NamedTunnelProperties,
|
tunnelTokenProvided bool,
|
||||||
fetchFunc PercentageFetcher,
|
|
||||||
ttl time.Duration,
|
|
||||||
log *zerolog.Logger,
|
|
||||||
needPQ bool,
|
needPQ bool,
|
||||||
|
protocolFetcher edgediscovery.PercentageFetcher,
|
||||||
|
resolveTTL time.Duration,
|
||||||
|
log *zerolog.Logger,
|
||||||
) (ProtocolSelector, error) {
|
) (ProtocolSelector, error) {
|
||||||
// Classic tunnel is only supported with h2mux
|
// With --post-quantum, we force quic
|
||||||
if namedTunnel == nil {
|
if needPQ {
|
||||||
if needPQ {
|
|
||||||
return nil, errors.New("Classic tunnel does not support post-quantum")
|
|
||||||
}
|
|
||||||
|
|
||||||
return &staticProtocolSelector{
|
return &staticProtocolSelector{
|
||||||
current: H2mux,
|
current: QUIC,
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
threshold := switchThreshold(namedTunnel.Credentials.AccountTag)
|
threshold := switchThreshold(accountTag)
|
||||||
fetchedProtocol, err := getProtocol([]Protocol{QUIC, HTTP2}, fetchFunc, threshold)
|
fetchedProtocol, err := getProtocol(ProtocolList, protocolFetcher, threshold)
|
||||||
if err != nil && protocolFlag == "auto" {
|
log.Debug().Msgf("Fetched protocol: %s", fetchedProtocol)
|
||||||
log.Err(err).Msg("Unable to lookup protocol. Defaulting to `http2`. If this fails, you can attempt `--protocol quic` instead.")
|
if err != nil {
|
||||||
if needPQ {
|
log.Warn().Msg("Unable to lookup protocol percentage.")
|
||||||
return nil, errors.New("http2 does not support post-quantum")
|
// Falling through here since 'auto' is handled in the switch and failing
|
||||||
}
|
// to do the protocol lookup isn't a failure since it can be triggered again
|
||||||
return &staticProtocolSelector{
|
// after the TTL.
|
||||||
current: HTTP2,
|
|
||||||
}, nil
|
|
||||||
}
|
|
||||||
if warpRoutingEnabled {
|
|
||||||
if protocolFlag == H2mux.String() || fetchedProtocol == H2mux {
|
|
||||||
log.Warn().Msg("Warp routing is not supported in h2mux protocol. Upgrading to http2 to allow it.")
|
|
||||||
protocolFlag = HTTP2.String()
|
|
||||||
fetchedProtocol = HTTP2Warp
|
|
||||||
}
|
|
||||||
return selectWarpRoutingProtocols(protocolFlag, fetchFunc, ttl, log, threshold, fetchedProtocol, needPQ)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return selectNamedTunnelProtocols(protocolFlag, fetchFunc, ttl, log, threshold, fetchedProtocol, needPQ)
|
|
||||||
}
|
|
||||||
|
|
||||||
func selectNamedTunnelProtocols(
|
|
||||||
protocolFlag string,
|
|
||||||
fetchFunc PercentageFetcher,
|
|
||||||
ttl time.Duration,
|
|
||||||
log *zerolog.Logger,
|
|
||||||
threshold int32,
|
|
||||||
protocol Protocol,
|
|
||||||
needPQ bool,
|
|
||||||
) (ProtocolSelector, error) {
|
|
||||||
// If the user picks a protocol, then we stick to it no matter what.
|
// If the user picks a protocol, then we stick to it no matter what.
|
||||||
switch protocolFlag {
|
switch protocolFlag {
|
||||||
case H2mux.String():
|
case "h2mux":
|
||||||
return &staticProtocolSelector{current: H2mux}, nil
|
// Any users still requesting h2mux will be upgraded to http2 instead
|
||||||
|
log.Warn().Msg("h2mux is no longer a supported protocol: upgrading edge connection to http2. Please remove '--protocol h2mux' from runtime arguments to remove this warning.")
|
||||||
|
return &staticProtocolSelector{current: HTTP2}, nil
|
||||||
case QUIC.String():
|
case QUIC.String():
|
||||||
return &staticProtocolSelector{current: QUIC}, nil
|
return &staticProtocolSelector{current: QUIC}, nil
|
||||||
case HTTP2.String():
|
case HTTP2.String():
|
||||||
return &staticProtocolSelector{current: HTTP2}, nil
|
return &staticProtocolSelector{current: HTTP2}, nil
|
||||||
}
|
case AutoSelectFlag:
|
||||||
|
// When a --token is provided, we want to start with QUIC but have fallback to HTTP2
|
||||||
// If the user does not pick (hopefully the majority) then we use the one derived from the TXT DNS record and
|
if tunnelTokenProvided {
|
||||||
// fallback on failures.
|
return newDefaultProtocolSelector(QUIC), nil
|
||||||
if protocolFlag == AutoSelectFlag {
|
}
|
||||||
return newAutoProtocolSelector(protocol, []Protocol{QUIC, HTTP2, H2mux}, threshold, fetchFunc, ttl, log, needPQ), nil
|
return newRemoteProtocolSelector(fetchedProtocol, ProtocolList, threshold, protocolFetcher, resolveTTL, log), nil
|
||||||
}
|
|
||||||
|
|
||||||
return nil, fmt.Errorf("Unknown protocol %s, %s", protocolFlag, AvailableProtocolFlagMessage)
|
|
||||||
}
|
|
||||||
|
|
||||||
func selectWarpRoutingProtocols(
|
|
||||||
protocolFlag string,
|
|
||||||
fetchFunc PercentageFetcher,
|
|
||||||
ttl time.Duration,
|
|
||||||
log *zerolog.Logger,
|
|
||||||
threshold int32,
|
|
||||||
protocol Protocol,
|
|
||||||
needPQ bool,
|
|
||||||
) (ProtocolSelector, error) {
|
|
||||||
// If the user picks a protocol, then we stick to it no matter what.
|
|
||||||
switch protocolFlag {
|
|
||||||
case QUIC.String():
|
|
||||||
return &staticProtocolSelector{current: QUICWarp}, nil
|
|
||||||
case HTTP2.String():
|
|
||||||
return &staticProtocolSelector{current: HTTP2Warp}, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// If the user does not pick (hopefully the majority) then we use the one derived from the TXT DNS record and
|
|
||||||
// fallback on failures.
|
|
||||||
if protocolFlag == AutoSelectFlag {
|
|
||||||
return newAutoProtocolSelector(protocol, []Protocol{QUICWarp, HTTP2Warp}, threshold, fetchFunc, ttl, log, needPQ), nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil, fmt.Errorf("Unknown protocol %s, %s", protocolFlag, AvailableProtocolFlagMessage)
|
return nil, fmt.Errorf("Unknown protocol %s, %s", protocolFlag, AvailableProtocolFlagMessage)
|
||||||
|
|
|
@ -3,7 +3,6 @@ package connection
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"testing"
|
"testing"
|
||||||
"time"
|
|
||||||
|
|
||||||
"github.com/stretchr/testify/assert"
|
"github.com/stretchr/testify/assert"
|
||||||
|
|
||||||
|
@ -11,19 +10,11 @@ import (
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
testNoTTL = 0
|
testNoTTL = 0
|
||||||
noWarpRoutingEnabled = false
|
testAccountTag = "testAccountTag"
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
func mockFetcher(getError bool, protocolPercent ...edgediscovery.ProtocolPercent) edgediscovery.PercentageFetcher {
|
||||||
testNamedTunnelProperties = &NamedTunnelProperties{
|
|
||||||
Credentials: Credentials{
|
|
||||||
AccountTag: "testAccountTag",
|
|
||||||
},
|
|
||||||
}
|
|
||||||
)
|
|
||||||
|
|
||||||
func mockFetcher(getError bool, protocolPercent ...edgediscovery.ProtocolPercent) PercentageFetcher {
|
|
||||||
return func() (edgediscovery.ProtocolPercents, error) {
|
return func() (edgediscovery.ProtocolPercents, error) {
|
||||||
if getError {
|
if getError {
|
||||||
return nil, fmt.Errorf("failed to fetch percentage")
|
return nil, fmt.Errorf("failed to fetch percentage")
|
||||||
|
@ -37,7 +28,7 @@ type dynamicMockFetcher struct {
|
||||||
err error
|
err error
|
||||||
}
|
}
|
||||||
|
|
||||||
func (dmf *dynamicMockFetcher) fetch() PercentageFetcher {
|
func (dmf *dynamicMockFetcher) fetch() edgediscovery.PercentageFetcher {
|
||||||
return func() (edgediscovery.ProtocolPercents, error) {
|
return func() (edgediscovery.ProtocolPercents, error) {
|
||||||
return dmf.protocolPercents, dmf.err
|
return dmf.protocolPercents, dmf.err
|
||||||
}
|
}
|
||||||
|
@ -45,181 +36,58 @@ func (dmf *dynamicMockFetcher) fetch() PercentageFetcher {
|
||||||
|
|
||||||
func TestNewProtocolSelector(t *testing.T) {
|
func TestNewProtocolSelector(t *testing.T) {
|
||||||
tests := []struct {
|
tests := []struct {
|
||||||
name string
|
name string
|
||||||
protocol string
|
protocol string
|
||||||
expectedProtocol Protocol
|
tunnelTokenProvided bool
|
||||||
hasFallback bool
|
needPQ bool
|
||||||
expectedFallback Protocol
|
expectedProtocol Protocol
|
||||||
warpRoutingEnabled bool
|
hasFallback bool
|
||||||
namedTunnelConfig *NamedTunnelProperties
|
expectedFallback Protocol
|
||||||
fetchFunc PercentageFetcher
|
wantErr bool
|
||||||
wantErr bool
|
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "classic tunnel",
|
name: "named tunnel with unknown protocol",
|
||||||
protocol: "h2mux",
|
protocol: "unknown",
|
||||||
expectedProtocol: H2mux,
|
wantErr: true,
|
||||||
namedTunnelConfig: nil,
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "named tunnel over h2mux",
|
name: "named tunnel with h2mux: force to http2",
|
||||||
protocol: "h2mux",
|
protocol: "h2mux",
|
||||||
expectedProtocol: H2mux,
|
|
||||||
fetchFunc: func() (edgediscovery.ProtocolPercents, error) { return nil, nil },
|
|
||||||
namedTunnelConfig: testNamedTunnelProperties,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "named tunnel over http2",
|
|
||||||
protocol: "http2",
|
|
||||||
expectedProtocol: HTTP2,
|
|
||||||
fetchFunc: mockFetcher(false, edgediscovery.ProtocolPercent{Protocol: "http2", Percentage: 0}),
|
|
||||||
namedTunnelConfig: testNamedTunnelProperties,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "named tunnel http2 disabled still gets http2 because it is manually picked",
|
|
||||||
protocol: "http2",
|
|
||||||
expectedProtocol: HTTP2,
|
|
||||||
fetchFunc: mockFetcher(false, edgediscovery.ProtocolPercent{Protocol: "http2", Percentage: -1}),
|
|
||||||
namedTunnelConfig: testNamedTunnelProperties,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "named tunnel quic disabled still gets quic because it is manually picked",
|
|
||||||
protocol: "quic",
|
|
||||||
expectedProtocol: QUIC,
|
|
||||||
fetchFunc: mockFetcher(false, edgediscovery.ProtocolPercent{Protocol: "http2", Percentage: 100}, edgediscovery.ProtocolPercent{Protocol: "quic", Percentage: -1}),
|
|
||||||
namedTunnelConfig: testNamedTunnelProperties,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "named tunnel quic and http2 disabled",
|
|
||||||
protocol: AutoSelectFlag,
|
|
||||||
expectedProtocol: H2mux,
|
|
||||||
fetchFunc: mockFetcher(false, edgediscovery.ProtocolPercent{Protocol: "http2", Percentage: -1}, edgediscovery.ProtocolPercent{Protocol: "quic", Percentage: -1}),
|
|
||||||
namedTunnelConfig: testNamedTunnelProperties,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "named tunnel quic disabled",
|
|
||||||
protocol: AutoSelectFlag,
|
|
||||||
expectedProtocol: HTTP2,
|
expectedProtocol: HTTP2,
|
||||||
// Hasfallback true is because if http2 fails, then we further fallback to h2mux.
|
|
||||||
hasFallback: true,
|
|
||||||
expectedFallback: H2mux,
|
|
||||||
fetchFunc: mockFetcher(false, edgediscovery.ProtocolPercent{Protocol: "http2", Percentage: 100}, edgediscovery.ProtocolPercent{Protocol: "quic", Percentage: -1}),
|
|
||||||
namedTunnelConfig: testNamedTunnelProperties,
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "named tunnel auto all http2 disabled",
|
name: "named tunnel with http2: no fallback",
|
||||||
protocol: AutoSelectFlag,
|
protocol: "http2",
|
||||||
expectedProtocol: H2mux,
|
expectedProtocol: HTTP2,
|
||||||
fetchFunc: mockFetcher(false, edgediscovery.ProtocolPercent{Protocol: "http2", Percentage: -1}),
|
|
||||||
namedTunnelConfig: testNamedTunnelProperties,
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "named tunnel auto to h2mux",
|
name: "named tunnel with auto: quic",
|
||||||
protocol: AutoSelectFlag,
|
protocol: AutoSelectFlag,
|
||||||
expectedProtocol: H2mux,
|
expectedProtocol: QUIC,
|
||||||
fetchFunc: mockFetcher(false, edgediscovery.ProtocolPercent{Protocol: "http2", Percentage: 0}),
|
hasFallback: true,
|
||||||
namedTunnelConfig: testNamedTunnelProperties,
|
expectedFallback: HTTP2,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "named tunnel auto to http2",
|
name: "named tunnel (post quantum)",
|
||||||
protocol: AutoSelectFlag,
|
protocol: AutoSelectFlag,
|
||||||
expectedProtocol: HTTP2,
|
needPQ: true,
|
||||||
hasFallback: true,
|
expectedProtocol: QUIC,
|
||||||
expectedFallback: H2mux,
|
|
||||||
fetchFunc: mockFetcher(false, edgediscovery.ProtocolPercent{Protocol: "http2", Percentage: 100}),
|
|
||||||
namedTunnelConfig: testNamedTunnelProperties,
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "named tunnel auto to quic",
|
name: "named tunnel (post quantum) w/http2",
|
||||||
protocol: AutoSelectFlag,
|
protocol: "http2",
|
||||||
expectedProtocol: QUIC,
|
needPQ: true,
|
||||||
hasFallback: true,
|
expectedProtocol: QUIC,
|
||||||
expectedFallback: HTTP2,
|
|
||||||
fetchFunc: mockFetcher(false, edgediscovery.ProtocolPercent{Protocol: "quic", Percentage: 100}),
|
|
||||||
namedTunnelConfig: testNamedTunnelProperties,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "warp routing requesting h2mux",
|
|
||||||
protocol: "h2mux",
|
|
||||||
expectedProtocol: HTTP2Warp,
|
|
||||||
hasFallback: false,
|
|
||||||
fetchFunc: mockFetcher(false, edgediscovery.ProtocolPercent{Protocol: "http2", Percentage: 100}),
|
|
||||||
warpRoutingEnabled: true,
|
|
||||||
namedTunnelConfig: testNamedTunnelProperties,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "warp routing requesting h2mux picks HTTP2 even if http2 percent is -1",
|
|
||||||
protocol: "h2mux",
|
|
||||||
expectedProtocol: HTTP2Warp,
|
|
||||||
hasFallback: false,
|
|
||||||
fetchFunc: mockFetcher(false, edgediscovery.ProtocolPercent{Protocol: "http2", Percentage: -1}),
|
|
||||||
warpRoutingEnabled: true,
|
|
||||||
namedTunnelConfig: testNamedTunnelProperties,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "warp routing http2",
|
|
||||||
protocol: "http2",
|
|
||||||
expectedProtocol: HTTP2Warp,
|
|
||||||
hasFallback: false,
|
|
||||||
fetchFunc: mockFetcher(false, edgediscovery.ProtocolPercent{Protocol: "http2", Percentage: 100}),
|
|
||||||
warpRoutingEnabled: true,
|
|
||||||
namedTunnelConfig: testNamedTunnelProperties,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "warp routing quic",
|
|
||||||
protocol: AutoSelectFlag,
|
|
||||||
expectedProtocol: QUICWarp,
|
|
||||||
hasFallback: true,
|
|
||||||
expectedFallback: HTTP2Warp,
|
|
||||||
fetchFunc: mockFetcher(false, edgediscovery.ProtocolPercent{Protocol: "quic", Percentage: 100}),
|
|
||||||
warpRoutingEnabled: true,
|
|
||||||
namedTunnelConfig: testNamedTunnelProperties,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "warp routing auto",
|
|
||||||
protocol: AutoSelectFlag,
|
|
||||||
expectedProtocol: HTTP2Warp,
|
|
||||||
hasFallback: false,
|
|
||||||
fetchFunc: mockFetcher(false, edgediscovery.ProtocolPercent{Protocol: "http2", Percentage: 100}),
|
|
||||||
warpRoutingEnabled: true,
|
|
||||||
namedTunnelConfig: testNamedTunnelProperties,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "warp routing auto- quic",
|
|
||||||
protocol: AutoSelectFlag,
|
|
||||||
expectedProtocol: QUICWarp,
|
|
||||||
hasFallback: true,
|
|
||||||
expectedFallback: HTTP2Warp,
|
|
||||||
fetchFunc: mockFetcher(false, edgediscovery.ProtocolPercent{Protocol: "http2", Percentage: 100}, edgediscovery.ProtocolPercent{Protocol: "quic", Percentage: 100}),
|
|
||||||
warpRoutingEnabled: true,
|
|
||||||
namedTunnelConfig: testNamedTunnelProperties,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
// None named tunnel can only use h2mux, so specifying an unknown protocol is not an error
|
|
||||||
name: "classic tunnel unknown protocol",
|
|
||||||
protocol: "unknown",
|
|
||||||
expectedProtocol: H2mux,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "named tunnel unknown protocol",
|
|
||||||
protocol: "unknown",
|
|
||||||
fetchFunc: mockFetcher(false, edgediscovery.ProtocolPercent{Protocol: "http2", Percentage: 100}),
|
|
||||||
namedTunnelConfig: testNamedTunnelProperties,
|
|
||||||
wantErr: true,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "named tunnel fetch error",
|
|
||||||
protocol: AutoSelectFlag,
|
|
||||||
fetchFunc: mockFetcher(true),
|
|
||||||
namedTunnelConfig: testNamedTunnelProperties,
|
|
||||||
expectedProtocol: HTTP2,
|
|
||||||
wantErr: false,
|
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
fetcher := dynamicMockFetcher{
|
||||||
|
protocolPercents: edgediscovery.ProtocolPercents{},
|
||||||
|
}
|
||||||
|
|
||||||
for _, test := range tests {
|
for _, test := range tests {
|
||||||
t.Run(test.name, func(t *testing.T) {
|
t.Run(test.name, func(t *testing.T) {
|
||||||
selector, err := NewProtocolSelector(test.protocol, test.warpRoutingEnabled, test.namedTunnelConfig, test.fetchFunc, testNoTTL, &log, false)
|
selector, err := NewProtocolSelector(test.protocol, testAccountTag, test.tunnelTokenProvided, test.needPQ, fetcher.fetch(), ResolveTTL, &log)
|
||||||
if test.wantErr {
|
if test.wantErr {
|
||||||
assert.Error(t, err, fmt.Sprintf("test %s failed", test.name))
|
assert.Error(t, err, fmt.Sprintf("test %s failed", test.name))
|
||||||
} else {
|
} else {
|
||||||
|
@ -237,15 +105,15 @@ func TestNewProtocolSelector(t *testing.T) {
|
||||||
|
|
||||||
func TestAutoProtocolSelectorRefresh(t *testing.T) {
|
func TestAutoProtocolSelectorRefresh(t *testing.T) {
|
||||||
fetcher := dynamicMockFetcher{}
|
fetcher := dynamicMockFetcher{}
|
||||||
selector, err := NewProtocolSelector(AutoSelectFlag, noWarpRoutingEnabled, testNamedTunnelProperties, fetcher.fetch(), testNoTTL, &log, false)
|
selector, err := NewProtocolSelector(AutoSelectFlag, testAccountTag, false, false, fetcher.fetch(), testNoTTL, &log)
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
assert.Equal(t, H2mux, selector.Current())
|
assert.Equal(t, QUIC, selector.Current())
|
||||||
|
|
||||||
fetcher.protocolPercents = edgediscovery.ProtocolPercents{edgediscovery.ProtocolPercent{Protocol: "http2", Percentage: 100}}
|
fetcher.protocolPercents = edgediscovery.ProtocolPercents{edgediscovery.ProtocolPercent{Protocol: "http2", Percentage: 100}}
|
||||||
assert.Equal(t, HTTP2, selector.Current())
|
assert.Equal(t, HTTP2, selector.Current())
|
||||||
|
|
||||||
fetcher.protocolPercents = edgediscovery.ProtocolPercents{edgediscovery.ProtocolPercent{Protocol: "http2", Percentage: 0}}
|
fetcher.protocolPercents = edgediscovery.ProtocolPercents{edgediscovery.ProtocolPercent{Protocol: "http2", Percentage: 0}}
|
||||||
assert.Equal(t, H2mux, selector.Current())
|
assert.Equal(t, QUIC, selector.Current())
|
||||||
|
|
||||||
fetcher.protocolPercents = edgediscovery.ProtocolPercents{edgediscovery.ProtocolPercent{Protocol: "http2", Percentage: 100}}
|
fetcher.protocolPercents = edgediscovery.ProtocolPercents{edgediscovery.ProtocolPercent{Protocol: "http2", Percentage: 100}}
|
||||||
assert.Equal(t, HTTP2, selector.Current())
|
assert.Equal(t, HTTP2, selector.Current())
|
||||||
|
@ -255,10 +123,10 @@ func TestAutoProtocolSelectorRefresh(t *testing.T) {
|
||||||
|
|
||||||
fetcher.protocolPercents = edgediscovery.ProtocolPercents{edgediscovery.ProtocolPercent{Protocol: "http2", Percentage: -1}}
|
fetcher.protocolPercents = edgediscovery.ProtocolPercents{edgediscovery.ProtocolPercent{Protocol: "http2", Percentage: -1}}
|
||||||
fetcher.err = nil
|
fetcher.err = nil
|
||||||
assert.Equal(t, H2mux, selector.Current())
|
assert.Equal(t, QUIC, selector.Current())
|
||||||
|
|
||||||
fetcher.protocolPercents = edgediscovery.ProtocolPercents{edgediscovery.ProtocolPercent{Protocol: "http2", Percentage: 0}}
|
fetcher.protocolPercents = edgediscovery.ProtocolPercents{edgediscovery.ProtocolPercent{Protocol: "http2", Percentage: 0}}
|
||||||
assert.Equal(t, H2mux, selector.Current())
|
assert.Equal(t, QUIC, selector.Current())
|
||||||
|
|
||||||
fetcher.protocolPercents = edgediscovery.ProtocolPercents{edgediscovery.ProtocolPercent{Protocol: "quic", Percentage: 100}}
|
fetcher.protocolPercents = edgediscovery.ProtocolPercents{edgediscovery.ProtocolPercent{Protocol: "quic", Percentage: 100}}
|
||||||
assert.Equal(t, QUIC, selector.Current())
|
assert.Equal(t, QUIC, selector.Current())
|
||||||
|
@ -267,7 +135,7 @@ func TestAutoProtocolSelectorRefresh(t *testing.T) {
|
||||||
func TestHTTP2ProtocolSelectorRefresh(t *testing.T) {
|
func TestHTTP2ProtocolSelectorRefresh(t *testing.T) {
|
||||||
fetcher := dynamicMockFetcher{}
|
fetcher := dynamicMockFetcher{}
|
||||||
// Since the user chooses http2 on purpose, we always stick to it.
|
// Since the user chooses http2 on purpose, we always stick to it.
|
||||||
selector, err := NewProtocolSelector("http2", noWarpRoutingEnabled, testNamedTunnelProperties, fetcher.fetch(), testNoTTL, &log, false)
|
selector, err := NewProtocolSelector(HTTP2.String(), testAccountTag, false, false, fetcher.fetch(), testNoTTL, &log)
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
assert.Equal(t, HTTP2, selector.Current())
|
assert.Equal(t, HTTP2, selector.Current())
|
||||||
|
|
||||||
|
@ -294,13 +162,12 @@ func TestHTTP2ProtocolSelectorRefresh(t *testing.T) {
|
||||||
assert.Equal(t, HTTP2, selector.Current())
|
assert.Equal(t, HTTP2, selector.Current())
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestProtocolSelectorRefreshTTL(t *testing.T) {
|
func TestAutoProtocolSelectorNoRefreshWithToken(t *testing.T) {
|
||||||
fetcher := dynamicMockFetcher{}
|
fetcher := dynamicMockFetcher{}
|
||||||
fetcher.protocolPercents = edgediscovery.ProtocolPercents{edgediscovery.ProtocolPercent{Protocol: "quic", Percentage: 100}}
|
selector, err := NewProtocolSelector(AutoSelectFlag, testAccountTag, true, false, fetcher.fetch(), testNoTTL, &log)
|
||||||
selector, err := NewProtocolSelector(AutoSelectFlag, noWarpRoutingEnabled, testNamedTunnelProperties, fetcher.fetch(), time.Hour, &log, false)
|
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
assert.Equal(t, QUIC, selector.Current())
|
assert.Equal(t, QUIC, selector.Current())
|
||||||
|
|
||||||
fetcher.protocolPercents = edgediscovery.ProtocolPercents{edgediscovery.ProtocolPercent{Protocol: "quic", Percentage: 0}}
|
fetcher.protocolPercents = edgediscovery.ProtocolPercents{edgediscovery.ProtocolPercent{Protocol: "http2", Percentage: 100}}
|
||||||
assert.Equal(t, QUIC, selector.Current())
|
assert.Equal(t, QUIC, selector.Current())
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,6 +1,7 @@
|
||||||
package connection
|
package connection
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"bufio"
|
||||||
"context"
|
"context"
|
||||||
"crypto/tls"
|
"crypto/tls"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
@ -24,6 +25,7 @@ import (
|
||||||
|
|
||||||
"github.com/cloudflare/cloudflared/datagramsession"
|
"github.com/cloudflare/cloudflared/datagramsession"
|
||||||
"github.com/cloudflare/cloudflared/ingress"
|
"github.com/cloudflare/cloudflared/ingress"
|
||||||
|
"github.com/cloudflare/cloudflared/management"
|
||||||
"github.com/cloudflare/cloudflared/packet"
|
"github.com/cloudflare/cloudflared/packet"
|
||||||
quicpogs "github.com/cloudflare/cloudflared/quic"
|
quicpogs "github.com/cloudflare/cloudflared/quic"
|
||||||
"github.com/cloudflare/cloudflared/tracing"
|
"github.com/cloudflare/cloudflared/tracing"
|
||||||
|
@ -60,12 +62,14 @@ type QUICConnection struct {
|
||||||
packetRouter *ingress.PacketRouter
|
packetRouter *ingress.PacketRouter
|
||||||
controlStreamHandler ControlStreamHandler
|
controlStreamHandler ControlStreamHandler
|
||||||
connOptions *tunnelpogs.ConnectionOptions
|
connOptions *tunnelpogs.ConnectionOptions
|
||||||
|
connIndex uint8
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewQUICConnection returns a new instance of QUICConnection.
|
// NewQUICConnection returns a new instance of QUICConnection.
|
||||||
func NewQUICConnection(
|
func NewQUICConnection(
|
||||||
quicConfig *quic.Config,
|
quicConfig *quic.Config,
|
||||||
edgeAddr net.Addr,
|
edgeAddr net.Addr,
|
||||||
|
localAddr net.IP,
|
||||||
connIndex uint8,
|
connIndex uint8,
|
||||||
tlsConfig *tls.Config,
|
tlsConfig *tls.Config,
|
||||||
orchestrator Orchestrator,
|
orchestrator Orchestrator,
|
||||||
|
@ -74,13 +78,15 @@ func NewQUICConnection(
|
||||||
logger *zerolog.Logger,
|
logger *zerolog.Logger,
|
||||||
packetRouterConfig *ingress.GlobalRouterConfig,
|
packetRouterConfig *ingress.GlobalRouterConfig,
|
||||||
) (*QUICConnection, error) {
|
) (*QUICConnection, error) {
|
||||||
udpConn, err := createUDPConnForConnIndex(connIndex, logger)
|
udpConn, err := createUDPConnForConnIndex(connIndex, localAddr, logger)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
session, err := quic.Dial(udpConn, edgeAddr, edgeAddr.String(), tlsConfig, quicConfig)
|
session, err := quic.Dial(udpConn, edgeAddr, edgeAddr.String(), tlsConfig, quicConfig)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
// close the udp server socket in case of error connecting to the edge
|
||||||
|
udpConn.Close()
|
||||||
return nil, &EdgeQuicDialError{Cause: err}
|
return nil, &EdgeQuicDialError{Cause: err}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -104,6 +110,7 @@ func NewQUICConnection(
|
||||||
packetRouter: packetRouter,
|
packetRouter: packetRouter,
|
||||||
controlStreamHandler: controlStreamHandler,
|
controlStreamHandler: controlStreamHandler,
|
||||||
connOptions: connOptions,
|
connOptions: connOptions,
|
||||||
|
connIndex: connIndex,
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -191,7 +198,11 @@ func (q *QUICConnection) runStream(quicStream quic.Stream) {
|
||||||
// A call to close will simulate a close to the read-side, which will fail subsequent reads.
|
// A call to close will simulate a close to the read-side, which will fail subsequent reads.
|
||||||
noCloseStream := &nopCloserReadWriter{ReadWriteCloser: stream}
|
noCloseStream := &nopCloserReadWriter{ReadWriteCloser: stream}
|
||||||
if err := q.handleStream(ctx, noCloseStream); err != nil {
|
if err := q.handleStream(ctx, noCloseStream); err != nil {
|
||||||
q.logger.Err(err).Msg("Failed to handle QUIC stream")
|
q.logger.Debug().Err(err).Msg("Failed to handle QUIC stream")
|
||||||
|
|
||||||
|
// if we received an error at this level, then close write side of stream with an error, which will result in
|
||||||
|
// RST_STREAM frame.
|
||||||
|
quicStream.CancelWrite(0)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -224,43 +235,61 @@ func (q *QUICConnection) handleDataStream(ctx context.Context, stream *quicpogs.
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := q.dispatchRequest(ctx, stream, err, request); err != nil {
|
if err, connectResponseSent := q.dispatchRequest(ctx, stream, err, request); err != nil {
|
||||||
_ = stream.WriteConnectResponseData(err)
|
|
||||||
q.logger.Err(err).Str("type", request.Type.String()).Str("dest", request.Dest).Msg("Request failed")
|
q.logger.Err(err).Str("type", request.Type.String()).Str("dest", request.Dest).Msg("Request failed")
|
||||||
|
|
||||||
|
// if the connectResponse was already sent and we had an error, we need to propagate it up, so that the stream is
|
||||||
|
// closed with an RST_STREAM frame
|
||||||
|
if connectResponseSent {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if writeRespErr := stream.WriteConnectResponseData(err); writeRespErr != nil {
|
||||||
|
return writeRespErr
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (q *QUICConnection) dispatchRequest(ctx context.Context, stream *quicpogs.RequestServerStream, err error, request *quicpogs.ConnectRequest) error {
|
// dispatchRequest will dispatch the request depending on the type and returns an error if it occurs.
|
||||||
|
// More importantly, it also tells if the during processing of the request the ConnectResponse metadata was sent downstream.
|
||||||
|
// This is important since it informs
|
||||||
|
func (q *QUICConnection) dispatchRequest(ctx context.Context, stream *quicpogs.RequestServerStream, err error, request *quicpogs.ConnectRequest) (error, bool) {
|
||||||
originProxy, err := q.orchestrator.GetOriginProxy()
|
originProxy, err := q.orchestrator.GetOriginProxy()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err, false
|
||||||
}
|
}
|
||||||
|
|
||||||
switch request.Type {
|
switch request.Type {
|
||||||
case quicpogs.ConnectionTypeHTTP, quicpogs.ConnectionTypeWebsocket:
|
case quicpogs.ConnectionTypeHTTP, quicpogs.ConnectionTypeWebsocket:
|
||||||
tracedReq, err := buildHTTPRequest(ctx, request, stream, q.logger)
|
tracedReq, err := buildHTTPRequest(ctx, request, stream, q.connIndex, q.logger)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err, false
|
||||||
}
|
}
|
||||||
w := newHTTPResponseAdapter(stream)
|
w := newHTTPResponseAdapter(stream)
|
||||||
return originProxy.ProxyHTTP(w, tracedReq, request.Type == quicpogs.ConnectionTypeWebsocket)
|
return originProxy.ProxyHTTP(&w, tracedReq, request.Type == quicpogs.ConnectionTypeWebsocket), w.connectResponseSent
|
||||||
|
|
||||||
case quicpogs.ConnectionTypeTCP:
|
case quicpogs.ConnectionTypeTCP:
|
||||||
rwa := &streamReadWriteAcker{stream}
|
rwa := &streamReadWriteAcker{RequestServerStream: stream}
|
||||||
metadata := request.MetadataMap()
|
metadata := request.MetadataMap()
|
||||||
return originProxy.ProxyTCP(ctx, rwa, &TCPRequest{
|
return originProxy.ProxyTCP(ctx, rwa, &TCPRequest{
|
||||||
Dest: request.Dest,
|
Dest: request.Dest,
|
||||||
FlowID: metadata[QUICMetadataFlowID],
|
FlowID: metadata[QUICMetadataFlowID],
|
||||||
CfTraceID: metadata[tracing.TracerContextName],
|
CfTraceID: metadata[tracing.TracerContextName],
|
||||||
})
|
ConnIndex: q.connIndex,
|
||||||
|
}), rwa.connectResponseSent
|
||||||
|
default:
|
||||||
|
return errors.Errorf("unsupported error type: %s", request.Type), false
|
||||||
}
|
}
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (q *QUICConnection) handleRPCStream(rpcStream *quicpogs.RPCServerStream) error {
|
func (q *QUICConnection) handleRPCStream(rpcStream *quicpogs.RPCServerStream) error {
|
||||||
return rpcStream.Serve(q, q, q.logger)
|
if err := rpcStream.Serve(q, q, q.logger); err != nil {
|
||||||
|
q.logger.Err(err).Msg("failed handling RPC stream")
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// RegisterUdpSession is the RPC method invoked by edge to register and run a session
|
// RegisterUdpSession is the RPC method invoked by edge to register and run a session
|
||||||
|
@ -270,11 +299,12 @@ func (q *QUICConnection) RegisterUdpSession(ctx context.Context, sessionID uuid.
|
||||||
attribute.String("session-id", sessionID.String()),
|
attribute.String("session-id", sessionID.String()),
|
||||||
attribute.String("dst", fmt.Sprintf("%s:%d", dstIP, dstPort)),
|
attribute.String("dst", fmt.Sprintf("%s:%d", dstIP, dstPort)),
|
||||||
))
|
))
|
||||||
|
log := q.logger.With().Int(management.EventTypeKey, int(management.UDP)).Logger()
|
||||||
// Each session is a series of datagram from an eyeball to a dstIP:dstPort.
|
// Each session is a series of datagram from an eyeball to a dstIP:dstPort.
|
||||||
// (src port, dst IP, dst port) uniquely identifies a session, so it needs a dedicated connected socket.
|
// (src port, dst IP, dst port) uniquely identifies a session, so it needs a dedicated connected socket.
|
||||||
originProxy, err := ingress.DialUDP(dstIP, dstPort)
|
originProxy, err := ingress.DialUDP(dstIP, dstPort)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
q.logger.Err(err).Msgf("Failed to create udp proxy to %s:%d", dstIP, dstPort)
|
log.Err(err).Msgf("Failed to create udp proxy to %s:%d", dstIP, dstPort)
|
||||||
tracing.EndWithErrorStatus(registerSpan, err)
|
tracing.EndWithErrorStatus(registerSpan, err)
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
@ -285,14 +315,18 @@ func (q *QUICConnection) RegisterUdpSession(ctx context.Context, sessionID uuid.
|
||||||
|
|
||||||
session, err := q.sessionManager.RegisterSession(ctx, sessionID, originProxy)
|
session, err := q.sessionManager.RegisterSession(ctx, sessionID, originProxy)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
q.logger.Err(err).Str("sessionID", sessionID.String()).Msgf("Failed to register udp session")
|
log.Err(err).Str("sessionID", sessionID.String()).Msgf("Failed to register udp session")
|
||||||
tracing.EndWithErrorStatus(registerSpan, err)
|
tracing.EndWithErrorStatus(registerSpan, err)
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
go q.serveUDPSession(session, closeAfterIdleHint)
|
go q.serveUDPSession(session, closeAfterIdleHint)
|
||||||
|
|
||||||
q.logger.Debug().Str("sessionID", sessionID.String()).Str("src", originProxy.LocalAddr().String()).Str("dst", fmt.Sprintf("%s:%d", dstIP, dstPort)).Msgf("Registered session")
|
log.Debug().
|
||||||
|
Str("sessionID", sessionID.String()).
|
||||||
|
Str("src", originProxy.LocalAddr().String()).
|
||||||
|
Str("dst", fmt.Sprintf("%s:%d", dstIP, dstPort)).
|
||||||
|
Msgf("Registered session")
|
||||||
tracing.End(registerSpan)
|
tracing.End(registerSpan)
|
||||||
|
|
||||||
resp := tunnelpogs.RegisterUdpSessionResponse{
|
resp := tunnelpogs.RegisterUdpSessionResponse{
|
||||||
|
@ -313,7 +347,10 @@ func (q *QUICConnection) serveUDPSession(session *datagramsession.Session, close
|
||||||
q.closeUDPSession(ctx, session.ID, "terminated without error")
|
q.closeUDPSession(ctx, session.ID, "terminated without error")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
q.logger.Debug().Err(err).Str("sessionID", session.ID.String()).Msg("Session terminated")
|
q.logger.Debug().Err(err).
|
||||||
|
Int(management.EventTypeKey, int(management.UDP)).
|
||||||
|
Str("sessionID", session.ID.String()).
|
||||||
|
Msg("Session terminated")
|
||||||
}
|
}
|
||||||
|
|
||||||
// closeUDPSession first unregisters the session from session manager, then it tries to unregister from edge
|
// closeUDPSession first unregisters the session from session manager, then it tries to unregister from edge
|
||||||
|
@ -323,7 +360,9 @@ func (q *QUICConnection) closeUDPSession(ctx context.Context, sessionID uuid.UUI
|
||||||
if err != nil {
|
if err != nil {
|
||||||
// Log this at debug because this is not an error if session was closed due to lost connection
|
// Log this at debug because this is not an error if session was closed due to lost connection
|
||||||
// with edge
|
// with edge
|
||||||
q.logger.Debug().Err(err).Str("sessionID", sessionID.String()).
|
q.logger.Debug().Err(err).
|
||||||
|
Int(management.EventTypeKey, int(management.UDP)).
|
||||||
|
Str("sessionID", sessionID.String()).
|
||||||
Msgf("Failed to open quic stream to unregister udp session with edge")
|
Msgf("Failed to open quic stream to unregister udp session with edge")
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
@ -355,31 +394,39 @@ func (q *QUICConnection) UpdateConfiguration(ctx context.Context, version int32,
|
||||||
// the client.
|
// the client.
|
||||||
type streamReadWriteAcker struct {
|
type streamReadWriteAcker struct {
|
||||||
*quicpogs.RequestServerStream
|
*quicpogs.RequestServerStream
|
||||||
|
connectResponseSent bool
|
||||||
}
|
}
|
||||||
|
|
||||||
// AckConnection acks response back to the proxy.
|
// AckConnection acks response back to the proxy.
|
||||||
func (s *streamReadWriteAcker) AckConnection(tracePropagation string) error {
|
func (s *streamReadWriteAcker) AckConnection(tracePropagation string) error {
|
||||||
metadata := quicpogs.Metadata{
|
metadata := []quicpogs.Metadata{}
|
||||||
Key: tracing.CanonicalCloudflaredTracingHeader,
|
// Only add tracing if provided by origintunneld
|
||||||
Val: tracePropagation,
|
if tracePropagation != "" {
|
||||||
|
metadata = append(metadata, quicpogs.Metadata{
|
||||||
|
Key: tracing.CanonicalCloudflaredTracingHeader,
|
||||||
|
Val: tracePropagation,
|
||||||
|
})
|
||||||
}
|
}
|
||||||
return s.WriteConnectResponseData(nil, metadata)
|
s.connectResponseSent = true
|
||||||
|
return s.WriteConnectResponseData(nil, metadata...)
|
||||||
}
|
}
|
||||||
|
|
||||||
// httpResponseAdapter translates responses written by the HTTP Proxy into ones that can be used in QUIC.
|
// httpResponseAdapter translates responses written by the HTTP Proxy into ones that can be used in QUIC.
|
||||||
type httpResponseAdapter struct {
|
type httpResponseAdapter struct {
|
||||||
*quicpogs.RequestServerStream
|
*quicpogs.RequestServerStream
|
||||||
|
headers http.Header
|
||||||
|
connectResponseSent bool
|
||||||
}
|
}
|
||||||
|
|
||||||
func newHTTPResponseAdapter(s *quicpogs.RequestServerStream) httpResponseAdapter {
|
func newHTTPResponseAdapter(s *quicpogs.RequestServerStream) httpResponseAdapter {
|
||||||
return httpResponseAdapter{s}
|
return httpResponseAdapter{RequestServerStream: s, headers: make(http.Header)}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (hrw httpResponseAdapter) AddTrailer(trailerName, trailerValue string) {
|
func (hrw *httpResponseAdapter) AddTrailer(trailerName, trailerValue string) {
|
||||||
// we do not support trailers over QUIC
|
// we do not support trailers over QUIC
|
||||||
}
|
}
|
||||||
|
|
||||||
func (hrw httpResponseAdapter) WriteRespHeaders(status int, header http.Header) error {
|
func (hrw *httpResponseAdapter) WriteRespHeaders(status int, header http.Header) error {
|
||||||
metadata := make([]quicpogs.Metadata, 0)
|
metadata := make([]quicpogs.Metadata, 0)
|
||||||
metadata = append(metadata, quicpogs.Metadata{Key: "HttpStatus", Val: strconv.Itoa(status)})
|
metadata = append(metadata, quicpogs.Metadata{Key: "HttpStatus", Val: strconv.Itoa(status)})
|
||||||
for k, vv := range header {
|
for k, vv := range header {
|
||||||
|
@ -388,17 +435,41 @@ func (hrw httpResponseAdapter) WriteRespHeaders(status int, header http.Header)
|
||||||
metadata = append(metadata, quicpogs.Metadata{Key: httpHeaderKey, Val: v})
|
metadata = append(metadata, quicpogs.Metadata{Key: httpHeaderKey, Val: v})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return hrw.WriteConnectResponseData(nil, metadata...)
|
return hrw.WriteConnectResponseData(nil, metadata...)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (hrw httpResponseAdapter) WriteErrorResponse(err error) {
|
func (hrw *httpResponseAdapter) Header() http.Header {
|
||||||
|
return hrw.headers
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hrw *httpResponseAdapter) WriteHeader(status int) {
|
||||||
|
hrw.WriteRespHeaders(status, hrw.headers)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hrw *httpResponseAdapter) Hijack() (net.Conn, *bufio.ReadWriter, error) {
|
||||||
|
conn := &localProxyConnection{hrw.ReadWriteCloser}
|
||||||
|
readWriter := bufio.NewReadWriter(
|
||||||
|
bufio.NewReader(hrw.ReadWriteCloser),
|
||||||
|
bufio.NewWriter(hrw.ReadWriteCloser),
|
||||||
|
)
|
||||||
|
return conn, readWriter, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hrw *httpResponseAdapter) WriteErrorResponse(err error) {
|
||||||
hrw.WriteConnectResponseData(err, quicpogs.Metadata{Key: "HttpStatus", Val: strconv.Itoa(http.StatusBadGateway)})
|
hrw.WriteConnectResponseData(err, quicpogs.Metadata{Key: "HttpStatus", Val: strconv.Itoa(http.StatusBadGateway)})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (hrw *httpResponseAdapter) WriteConnectResponseData(respErr error, metadata ...quicpogs.Metadata) error {
|
||||||
|
hrw.connectResponseSent = true
|
||||||
|
return hrw.RequestServerStream.WriteConnectResponseData(respErr, metadata...)
|
||||||
|
}
|
||||||
|
|
||||||
func buildHTTPRequest(
|
func buildHTTPRequest(
|
||||||
ctx context.Context,
|
ctx context.Context,
|
||||||
connectRequest *quicpogs.ConnectRequest,
|
connectRequest *quicpogs.ConnectRequest,
|
||||||
body io.ReadCloser,
|
body io.ReadCloser,
|
||||||
|
connIndex uint8,
|
||||||
log *zerolog.Logger,
|
log *zerolog.Logger,
|
||||||
) (*tracing.TracedHTTPRequest, error) {
|
) (*tracing.TracedHTTPRequest, error) {
|
||||||
metadata := connectRequest.MetadataMap()
|
metadata := connectRequest.MetadataMap()
|
||||||
|
@ -442,7 +513,7 @@ func buildHTTPRequest(
|
||||||
stripWebsocketUpgradeHeader(req)
|
stripWebsocketUpgradeHeader(req)
|
||||||
|
|
||||||
// Check for tracing on request
|
// Check for tracing on request
|
||||||
tracedReq := tracing.NewTracedHTTPRequest(req, log)
|
tracedReq := tracing.NewTracedHTTPRequest(req, connIndex, log)
|
||||||
return tracedReq, err
|
return tracedReq, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -523,13 +594,17 @@ func (rp *muxerWrapper) Close() error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func createUDPConnForConnIndex(connIndex uint8, logger *zerolog.Logger) (*net.UDPConn, error) {
|
func createUDPConnForConnIndex(connIndex uint8, localIP net.IP, logger *zerolog.Logger) (*net.UDPConn, error) {
|
||||||
portMapMutex.Lock()
|
portMapMutex.Lock()
|
||||||
defer portMapMutex.Unlock()
|
defer portMapMutex.Unlock()
|
||||||
|
|
||||||
|
if localIP == nil {
|
||||||
|
localIP = net.IPv4zero
|
||||||
|
}
|
||||||
|
|
||||||
// if port was not set yet, it will be zero, so bind will randomly allocate one.
|
// if port was not set yet, it will be zero, so bind will randomly allocate one.
|
||||||
if port, ok := portForConnIndex[connIndex]; ok {
|
if port, ok := portForConnIndex[connIndex]; ok {
|
||||||
udpConn, err := net.ListenUDP("udp", &net.UDPAddr{IP: net.IPv4zero, Port: port})
|
udpConn, err := net.ListenUDP("udp", &net.UDPAddr{IP: localIP, Port: port})
|
||||||
// if there wasn't an error, or if port was 0 (independently of error or not, just return)
|
// if there wasn't an error, or if port was 0 (independently of error or not, just return)
|
||||||
if err == nil {
|
if err == nil {
|
||||||
return udpConn, nil
|
return udpConn, nil
|
||||||
|
@ -539,7 +614,7 @@ func createUDPConnForConnIndex(connIndex uint8, logger *zerolog.Logger) (*net.UD
|
||||||
}
|
}
|
||||||
|
|
||||||
// if we reached here, then there was an error or port as not been allocated it.
|
// if we reached here, then there was an error or port as not been allocated it.
|
||||||
udpConn, err := net.ListenUDP("udp", &net.UDPAddr{IP: net.IPv4zero, Port: 0})
|
udpConn, err := net.ListenUDP("udp", &net.UDPAddr{IP: localIP, Port: 0})
|
||||||
if err == nil {
|
if err == nil {
|
||||||
udpAddr, ok := (udpConn.LocalAddr()).(*net.UDPAddr)
|
udpAddr, ok := (udpConn.LocalAddr()).(*net.UDPAddr)
|
||||||
if !ok {
|
if !ok {
|
||||||
|
|
|
@ -485,7 +485,7 @@ func TestBuildHTTPRequest(t *testing.T) {
|
||||||
for _, test := range tests {
|
for _, test := range tests {
|
||||||
test := test // capture range variable
|
test := test // capture range variable
|
||||||
t.Run(test.name, func(t *testing.T) {
|
t.Run(test.name, func(t *testing.T) {
|
||||||
req, err := buildHTTPRequest(context.Background(), test.connectRequest, test.body, &log)
|
req, err := buildHTTPRequest(context.Background(), test.connectRequest, test.body, 0, &log)
|
||||||
assert.NoError(t, err)
|
assert.NoError(t, err)
|
||||||
test.req = test.req.WithContext(req.Context())
|
test.req = test.req.WithContext(req.Context())
|
||||||
assert.Equal(t, test.req, req.Request)
|
assert.Equal(t, test.req, req.Request)
|
||||||
|
@ -572,7 +572,7 @@ func TestNopCloserReadWriterCloseAfterEOF(t *testing.T) {
|
||||||
|
|
||||||
func TestCreateUDPConnReuseSourcePort(t *testing.T) {
|
func TestCreateUDPConnReuseSourcePort(t *testing.T) {
|
||||||
logger := zerolog.Nop()
|
logger := zerolog.Nop()
|
||||||
conn, err := createUDPConnForConnIndex(0, &logger)
|
conn, err := createUDPConnForConnIndex(0, nil, &logger)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
getPortFunc := func(conn *net.UDPConn) int {
|
getPortFunc := func(conn *net.UDPConn) int {
|
||||||
|
@ -586,17 +586,17 @@ func TestCreateUDPConnReuseSourcePort(t *testing.T) {
|
||||||
conn.Close()
|
conn.Close()
|
||||||
|
|
||||||
// should get the same port as before.
|
// should get the same port as before.
|
||||||
conn, err = createUDPConnForConnIndex(0, &logger)
|
conn, err = createUDPConnForConnIndex(0, nil, &logger)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
require.Equal(t, initialPort, getPortFunc(conn))
|
require.Equal(t, initialPort, getPortFunc(conn))
|
||||||
|
|
||||||
// new index, should get a different port
|
// new index, should get a different port
|
||||||
conn1, err := createUDPConnForConnIndex(1, &logger)
|
conn1, err := createUDPConnForConnIndex(1, nil, &logger)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
require.NotEqual(t, initialPort, getPortFunc(conn1))
|
require.NotEqual(t, initialPort, getPortFunc(conn1))
|
||||||
|
|
||||||
// not closing the conn and trying to obtain a new conn for same index should give a different random port
|
// not closing the conn and trying to obtain a new conn for same index should give a different random port
|
||||||
conn, err = createUDPConnForConnIndex(0, &logger)
|
conn, err = createUDPConnForConnIndex(0, nil, &logger)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
require.NotEqual(t, initialPort, getPortFunc(conn))
|
require.NotEqual(t, initialPort, getPortFunc(conn))
|
||||||
}
|
}
|
||||||
|
@ -716,6 +716,7 @@ func testQUICConnection(udpListenerAddr net.Addr, t *testing.T, index uint8) *QU
|
||||||
qc, err := NewQUICConnection(
|
qc, err := NewQUICConnection(
|
||||||
testQUICConfig,
|
testQUICConfig,
|
||||||
udpListenerAddr,
|
udpListenerAddr,
|
||||||
|
nil,
|
||||||
index,
|
index,
|
||||||
tlsClientConfig,
|
tlsClientConfig,
|
||||||
&mockOrchestrator{originProxy: &mockOriginProxyWithRequest{}},
|
&mockOrchestrator{originProxy: &mockOriginProxyWithRequest{}},
|
||||||
|
|
|
@ -2,7 +2,6 @@ package connection
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"fmt"
|
|
||||||
"io"
|
"io"
|
||||||
"net"
|
"net"
|
||||||
"time"
|
"time"
|
||||||
|
@ -152,178 +151,3 @@ const (
|
||||||
unregister rpcName = "unregister"
|
unregister rpcName = "unregister"
|
||||||
authenticate rpcName = " authenticate"
|
authenticate rpcName = " authenticate"
|
||||||
)
|
)
|
||||||
|
|
||||||
func (h *h2muxConnection) registerTunnel(ctx context.Context, credentialSetter CredentialManager, classicTunnel *ClassicTunnelProperties, registrationOptions *tunnelpogs.RegistrationOptions) error {
|
|
||||||
h.observer.sendRegisteringEvent(registrationOptions.ConnectionID)
|
|
||||||
|
|
||||||
stream, err := h.newRPCStream(ctx, register)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
rpcClient := NewTunnelServerClient(ctx, stream, h.observer.log)
|
|
||||||
defer rpcClient.Close()
|
|
||||||
|
|
||||||
_ = h.logServerInfo(ctx, rpcClient)
|
|
||||||
registration := rpcClient.client.RegisterTunnel(
|
|
||||||
ctx,
|
|
||||||
classicTunnel.OriginCert,
|
|
||||||
classicTunnel.Hostname,
|
|
||||||
registrationOptions,
|
|
||||||
)
|
|
||||||
if registrationErr := registration.DeserializeError(); registrationErr != nil {
|
|
||||||
// RegisterTunnel RPC failure
|
|
||||||
return h.processRegisterTunnelError(registrationErr, register)
|
|
||||||
}
|
|
||||||
|
|
||||||
credentialSetter.SetEventDigest(h.connIndex, registration.EventDigest)
|
|
||||||
return h.processRegistrationSuccess(registration, register, credentialSetter, classicTunnel)
|
|
||||||
}
|
|
||||||
|
|
||||||
type CredentialManager interface {
|
|
||||||
ReconnectToken() ([]byte, error)
|
|
||||||
EventDigest(connID uint8) ([]byte, error)
|
|
||||||
SetEventDigest(connID uint8, digest []byte)
|
|
||||||
ConnDigest(connID uint8) ([]byte, error)
|
|
||||||
SetConnDigest(connID uint8, digest []byte)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *h2muxConnection) processRegistrationSuccess(
|
|
||||||
registration *tunnelpogs.TunnelRegistration,
|
|
||||||
name rpcName,
|
|
||||||
credentialManager CredentialManager, classicTunnel *ClassicTunnelProperties,
|
|
||||||
) error {
|
|
||||||
for _, logLine := range registration.LogLines {
|
|
||||||
h.observer.log.Info().Msg(logLine)
|
|
||||||
}
|
|
||||||
|
|
||||||
if registration.TunnelID != "" {
|
|
||||||
h.observer.metrics.tunnelsHA.AddTunnelID(h.connIndex, registration.TunnelID)
|
|
||||||
h.observer.log.Info().Msgf("Each HA connection's tunnel IDs: %v", h.observer.metrics.tunnelsHA.String())
|
|
||||||
}
|
|
||||||
|
|
||||||
credentialManager.SetConnDigest(h.connIndex, registration.ConnDigest)
|
|
||||||
h.observer.metrics.userHostnamesCounts.WithLabelValues(registration.Url).Inc()
|
|
||||||
|
|
||||||
h.observer.log.Info().Msgf("Route propagating, it may take up to 1 minute for your new route to become functional")
|
|
||||||
h.observer.metrics.regSuccess.WithLabelValues(string(name)).Inc()
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *h2muxConnection) processRegisterTunnelError(err tunnelpogs.TunnelRegistrationError, name rpcName) error {
|
|
||||||
if err.Error() == DuplicateConnectionError {
|
|
||||||
h.observer.metrics.regFail.WithLabelValues("dup_edge_conn", string(name)).Inc()
|
|
||||||
return errDuplicationConnection
|
|
||||||
}
|
|
||||||
h.observer.metrics.regFail.WithLabelValues("server_error", string(name)).Inc()
|
|
||||||
return ServerRegisterTunnelError{
|
|
||||||
Cause: err,
|
|
||||||
Permanent: err.IsPermanent(),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *h2muxConnection) reconnectTunnel(ctx context.Context, credentialManager CredentialManager, classicTunnel *ClassicTunnelProperties, registrationOptions *tunnelpogs.RegistrationOptions) error {
|
|
||||||
token, err := credentialManager.ReconnectToken()
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
eventDigest, err := credentialManager.EventDigest(h.connIndex)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
connDigest, err := credentialManager.ConnDigest(h.connIndex)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
h.observer.log.Debug().Msg("initiating RPC stream to reconnect")
|
|
||||||
stream, err := h.newRPCStream(ctx, register)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
rpcClient := NewTunnelServerClient(ctx, stream, h.observer.log)
|
|
||||||
defer rpcClient.Close()
|
|
||||||
|
|
||||||
_ = h.logServerInfo(ctx, rpcClient)
|
|
||||||
registration := rpcClient.client.ReconnectTunnel(
|
|
||||||
ctx,
|
|
||||||
token,
|
|
||||||
eventDigest,
|
|
||||||
connDigest,
|
|
||||||
classicTunnel.Hostname,
|
|
||||||
registrationOptions,
|
|
||||||
)
|
|
||||||
if registrationErr := registration.DeserializeError(); registrationErr != nil {
|
|
||||||
// ReconnectTunnel RPC failure
|
|
||||||
return h.processRegisterTunnelError(registrationErr, reconnect)
|
|
||||||
}
|
|
||||||
return h.processRegistrationSuccess(registration, reconnect, credentialManager, classicTunnel)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *h2muxConnection) logServerInfo(ctx context.Context, rpcClient *tunnelServerClient) error {
|
|
||||||
// Request server info without blocking tunnel registration; must use capnp library directly.
|
|
||||||
serverInfoPromise := tunnelrpc.TunnelServer{Client: rpcClient.client.Client}.GetServerInfo(ctx, func(tunnelrpc.TunnelServer_getServerInfo_Params) error {
|
|
||||||
return nil
|
|
||||||
})
|
|
||||||
serverInfoMessage, err := serverInfoPromise.Result().Struct()
|
|
||||||
if err != nil {
|
|
||||||
h.observer.log.Err(err).Msg("Failed to retrieve server information")
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
serverInfo, err := tunnelpogs.UnmarshalServerInfo(serverInfoMessage)
|
|
||||||
if err != nil {
|
|
||||||
h.observer.log.Err(err).Msg("Failed to retrieve server information")
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
h.observer.logServerInfo(h.connIndex, serverInfo.LocationName, net.IP{}, "Connection established")
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *h2muxConnection) registerNamedTunnel(
|
|
||||||
ctx context.Context,
|
|
||||||
namedTunnel *NamedTunnelProperties,
|
|
||||||
connOptions *tunnelpogs.ConnectionOptions,
|
|
||||||
) error {
|
|
||||||
stream, err := h.newRPCStream(ctx, register)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
rpcClient := h.newRPCClientFunc(ctx, stream, h.observer.log)
|
|
||||||
defer rpcClient.Close()
|
|
||||||
|
|
||||||
registrationDetails, err := rpcClient.RegisterConnection(ctx, namedTunnel, connOptions, h.connIndex, nil, h.observer)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
h.observer.logServerInfo(h.connIndex, registrationDetails.Location, nil, fmt.Sprintf("Connection %s registered", registrationDetails.UUID))
|
|
||||||
h.observer.sendConnectedEvent(h.connIndex, H2mux, registrationDetails.Location)
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (h *h2muxConnection) unregister(isNamedTunnel bool) {
|
|
||||||
h.observer.sendUnregisteringEvent(h.connIndex)
|
|
||||||
|
|
||||||
unregisterCtx, cancel := context.WithTimeout(context.Background(), h.gracePeriod)
|
|
||||||
defer cancel()
|
|
||||||
|
|
||||||
stream, err := h.newRPCStream(unregisterCtx, unregister)
|
|
||||||
if err != nil {
|
|
||||||
return
|
|
||||||
}
|
|
||||||
defer stream.Close()
|
|
||||||
|
|
||||||
if isNamedTunnel {
|
|
||||||
rpcClient := h.newRPCClientFunc(unregisterCtx, stream, h.observer.log)
|
|
||||||
defer rpcClient.Close()
|
|
||||||
|
|
||||||
rpcClient.GracefulShutdown(unregisterCtx, h.gracePeriod)
|
|
||||||
} else {
|
|
||||||
rpcClient := NewTunnelServerClient(unregisterCtx, stream, h.observer.log)
|
|
||||||
defer rpcClient.Close()
|
|
||||||
|
|
||||||
// gracePeriod is encoded in int64 using capnproto
|
|
||||||
_ = rpcClient.client.UnregisterTunnel(unregisterCtx, h.gracePeriod.Nanoseconds())
|
|
||||||
}
|
|
||||||
|
|
||||||
h.observer.log.Info().Uint8(LogFieldConnIndex, h.connIndex).Msg("Unregistered tunnel connection")
|
|
||||||
}
|
|
||||||
|
|
|
@ -0,0 +1,83 @@
|
||||||
|
package credentials
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/pkg/errors"
|
||||||
|
"github.com/rs/zerolog"
|
||||||
|
|
||||||
|
"github.com/cloudflare/cloudflared/cfapi"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
logFieldOriginCertPath = "originCertPath"
|
||||||
|
)
|
||||||
|
|
||||||
|
type User struct {
|
||||||
|
cert *OriginCert
|
||||||
|
certPath string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c User) AccountID() string {
|
||||||
|
return c.cert.AccountID
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c User) ZoneID() string {
|
||||||
|
return c.cert.ZoneID
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c User) APIToken() string {
|
||||||
|
return c.cert.APIToken
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c User) CertPath() string {
|
||||||
|
return c.certPath
|
||||||
|
}
|
||||||
|
|
||||||
|
// Client uses the user credentials to create a Cloudflare API client
|
||||||
|
func (c *User) Client(apiURL string, userAgent string, log *zerolog.Logger) (cfapi.Client, error) {
|
||||||
|
if apiURL == "" {
|
||||||
|
return nil, errors.New("An api-url was not provided for the Cloudflare API client")
|
||||||
|
}
|
||||||
|
client, err := cfapi.NewRESTClient(
|
||||||
|
apiURL,
|
||||||
|
c.cert.AccountID,
|
||||||
|
c.cert.ZoneID,
|
||||||
|
c.cert.APIToken,
|
||||||
|
userAgent,
|
||||||
|
log,
|
||||||
|
)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return client, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Read will load and read the origin cert.pem to load the user credentials
|
||||||
|
func Read(originCertPath string, log *zerolog.Logger) (*User, error) {
|
||||||
|
originCertLog := log.With().
|
||||||
|
Str(logFieldOriginCertPath, originCertPath).
|
||||||
|
Logger()
|
||||||
|
|
||||||
|
originCertPath, err := FindOriginCert(originCertPath, &originCertLog)
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.Wrap(err, "Error locating origin cert")
|
||||||
|
}
|
||||||
|
blocks, err := readOriginCert(originCertPath)
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.Wrapf(err, "Can't read origin cert from %s", originCertPath)
|
||||||
|
}
|
||||||
|
|
||||||
|
cert, err := decodeOriginCert(blocks)
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.Wrap(err, "Error decoding origin cert")
|
||||||
|
}
|
||||||
|
|
||||||
|
if cert.AccountID == "" {
|
||||||
|
return nil, errors.Errorf(`Origin certificate needs to be refreshed before creating new tunnels.\nDelete %s and run "cloudflared login" to obtain a new cert.`, originCertPath)
|
||||||
|
}
|
||||||
|
|
||||||
|
return &User{
|
||||||
|
cert: cert,
|
||||||
|
certPath: originCertPath,
|
||||||
|
}, nil
|
||||||
|
}
|
|
@ -0,0 +1,38 @@
|
||||||
|
package credentials
|
||||||
|
|
||||||
|
import (
|
||||||
|
"io/fs"
|
||||||
|
"os"
|
||||||
|
"path"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestCredentialsRead(t *testing.T) {
|
||||||
|
file, err := os.ReadFile("test-cloudflare-tunnel-cert-json.pem")
|
||||||
|
require.NoError(t, err)
|
||||||
|
dir := t.TempDir()
|
||||||
|
certPath := path.Join(dir, originCertFile)
|
||||||
|
os.WriteFile(certPath, file, fs.ModePerm)
|
||||||
|
user, err := Read(certPath, &nopLog)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Equal(t, certPath, user.CertPath())
|
||||||
|
require.Equal(t, "test-service-key", user.APIToken())
|
||||||
|
require.Equal(t, "7b0a4d77dfb881c1a3b7d61ea9443e19", user.ZoneID())
|
||||||
|
require.Equal(t, "abcdabcdabcdabcd1234567890abcdef", user.AccountID())
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestCredentialsClient(t *testing.T) {
|
||||||
|
user := User{
|
||||||
|
certPath: "/tmp/cert.pem",
|
||||||
|
cert: &OriginCert{
|
||||||
|
ZoneID: "7b0a4d77dfb881c1a3b7d61ea9443e19",
|
||||||
|
AccountID: "abcdabcdabcdabcd1234567890abcdef",
|
||||||
|
APIToken: "test-service-key",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
client, err := user.Client("example.com", "cloudflared/test", &nopLog)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.NotNil(t, client)
|
||||||
|
}
|
|
@ -0,0 +1,130 @@
|
||||||
|
package credentials
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"encoding/pem"
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
|
||||||
|
"github.com/mitchellh/go-homedir"
|
||||||
|
"github.com/rs/zerolog"
|
||||||
|
|
||||||
|
"github.com/cloudflare/cloudflared/config"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
DefaultCredentialFile = "cert.pem"
|
||||||
|
OriginCertFlag = "origincert"
|
||||||
|
)
|
||||||
|
|
||||||
|
type namedTunnelToken struct {
|
||||||
|
ZoneID string `json:"zoneID"`
|
||||||
|
AccountID string `json:"accountID"`
|
||||||
|
APIToken string `json:"apiToken"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type OriginCert struct {
|
||||||
|
ZoneID string
|
||||||
|
APIToken string
|
||||||
|
AccountID string
|
||||||
|
}
|
||||||
|
|
||||||
|
// FindDefaultOriginCertPath returns the first path that contains a cert.pem file. If none of the
|
||||||
|
// DefaultConfigSearchDirectories contains a cert.pem file, return empty string
|
||||||
|
func FindDefaultOriginCertPath() string {
|
||||||
|
for _, defaultConfigDir := range config.DefaultConfigSearchDirectories() {
|
||||||
|
originCertPath, _ := homedir.Expand(filepath.Join(defaultConfigDir, DefaultCredentialFile))
|
||||||
|
if ok := fileExists(originCertPath); ok {
|
||||||
|
return originCertPath
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
|
||||||
|
func decodeOriginCert(blocks []byte) (*OriginCert, error) {
|
||||||
|
if len(blocks) == 0 {
|
||||||
|
return nil, fmt.Errorf("Cannot decode empty certificate")
|
||||||
|
}
|
||||||
|
originCert := OriginCert{}
|
||||||
|
block, rest := pem.Decode(blocks)
|
||||||
|
for {
|
||||||
|
if block == nil {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
switch block.Type {
|
||||||
|
case "PRIVATE KEY", "CERTIFICATE":
|
||||||
|
// this is for legacy purposes.
|
||||||
|
break
|
||||||
|
case "ARGO TUNNEL TOKEN":
|
||||||
|
if originCert.ZoneID != "" || originCert.APIToken != "" {
|
||||||
|
return nil, fmt.Errorf("Found multiple tokens in the certificate")
|
||||||
|
}
|
||||||
|
// The token is a string,
|
||||||
|
// Try the newer JSON format
|
||||||
|
ntt := namedTunnelToken{}
|
||||||
|
if err := json.Unmarshal(block.Bytes, &ntt); err == nil {
|
||||||
|
originCert.ZoneID = ntt.ZoneID
|
||||||
|
originCert.APIToken = ntt.APIToken
|
||||||
|
originCert.AccountID = ntt.AccountID
|
||||||
|
}
|
||||||
|
default:
|
||||||
|
return nil, fmt.Errorf("Unknown block %s in the certificate", block.Type)
|
||||||
|
}
|
||||||
|
block, rest = pem.Decode(rest)
|
||||||
|
}
|
||||||
|
|
||||||
|
if originCert.ZoneID == "" || originCert.APIToken == "" {
|
||||||
|
return nil, fmt.Errorf("Missing token in the certificate")
|
||||||
|
}
|
||||||
|
|
||||||
|
return &originCert, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func readOriginCert(originCertPath string) ([]byte, error) {
|
||||||
|
originCert, err := os.ReadFile(originCertPath)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("cannot read %s to load origin certificate", originCertPath)
|
||||||
|
}
|
||||||
|
|
||||||
|
return originCert, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// FindOriginCert will check to make sure that the certificate exists at the specified file path.
|
||||||
|
func FindOriginCert(originCertPath string, log *zerolog.Logger) (string, error) {
|
||||||
|
if originCertPath == "" {
|
||||||
|
log.Error().Msgf("Cannot determine default origin certificate path. No file %s in %v. You need to specify the origin certificate path by specifying the origincert option in the configuration file, or set TUNNEL_ORIGIN_CERT environment variable", DefaultCredentialFile, config.DefaultConfigSearchDirectories())
|
||||||
|
return "", fmt.Errorf("client didn't specify origincert path")
|
||||||
|
}
|
||||||
|
var err error
|
||||||
|
originCertPath, err = homedir.Expand(originCertPath)
|
||||||
|
if err != nil {
|
||||||
|
log.Err(err).Msgf("Cannot resolve origin certificate path")
|
||||||
|
return "", fmt.Errorf("cannot resolve path %s", originCertPath)
|
||||||
|
}
|
||||||
|
// Check that the user has acquired a certificate using the login command
|
||||||
|
ok := fileExists(originCertPath)
|
||||||
|
if !ok {
|
||||||
|
log.Error().Msgf(`Cannot find a valid certificate for your origin at the path:
|
||||||
|
|
||||||
|
%s
|
||||||
|
|
||||||
|
If the path above is wrong, specify the path with the -origincert option.
|
||||||
|
If you don't have a certificate signed by Cloudflare, run the command:
|
||||||
|
|
||||||
|
cloudflared login
|
||||||
|
`, originCertPath)
|
||||||
|
return "", fmt.Errorf("cannot find a valid certificate at the path %s", originCertPath)
|
||||||
|
}
|
||||||
|
|
||||||
|
return originCertPath, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// FileExists checks to see if a file exist at the provided path.
|
||||||
|
func fileExists(path string) bool {
|
||||||
|
fileStat, err := os.Stat(path)
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
return !fileStat.IsDir()
|
||||||
|
}
|
|
@ -0,0 +1,110 @@
|
||||||
|
package credentials
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"io/fs"
|
||||||
|
"os"
|
||||||
|
"path"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/rs/zerolog"
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
originCertFile = "cert.pem"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
nopLog = zerolog.Nop().With().Logger()
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestLoadOriginCert(t *testing.T) {
|
||||||
|
cert, err := decodeOriginCert([]byte{})
|
||||||
|
assert.Equal(t, fmt.Errorf("Cannot decode empty certificate"), err)
|
||||||
|
assert.Nil(t, cert)
|
||||||
|
|
||||||
|
blocks, err := os.ReadFile("test-cert-unknown-block.pem")
|
||||||
|
assert.NoError(t, err)
|
||||||
|
cert, err = decodeOriginCert(blocks)
|
||||||
|
assert.Equal(t, fmt.Errorf("Unknown block RSA PRIVATE KEY in the certificate"), err)
|
||||||
|
assert.Nil(t, cert)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestJSONArgoTunnelTokenEmpty(t *testing.T) {
|
||||||
|
blocks, err := os.ReadFile("test-cert-no-token.pem")
|
||||||
|
assert.NoError(t, err)
|
||||||
|
cert, err := decodeOriginCert(blocks)
|
||||||
|
assert.Equal(t, fmt.Errorf("Missing token in the certificate"), err)
|
||||||
|
assert.Nil(t, cert)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestJSONArgoTunnelToken(t *testing.T) {
|
||||||
|
// The given cert's Argo Tunnel Token was generated by base64 encoding this JSON:
|
||||||
|
// {
|
||||||
|
// "zoneID": "7b0a4d77dfb881c1a3b7d61ea9443e19",
|
||||||
|
// "apiToken": "test-service-key",
|
||||||
|
// "accountID": "abcdabcdabcdabcd1234567890abcdef"
|
||||||
|
// }
|
||||||
|
CloudflareTunnelTokenTest(t, "test-cloudflare-tunnel-cert-json.pem")
|
||||||
|
}
|
||||||
|
|
||||||
|
func CloudflareTunnelTokenTest(t *testing.T, path string) {
|
||||||
|
blocks, err := os.ReadFile(path)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
cert, err := decodeOriginCert(blocks)
|
||||||
|
assert.NoError(t, err)
|
||||||
|
assert.NotNil(t, cert)
|
||||||
|
assert.Equal(t, "7b0a4d77dfb881c1a3b7d61ea9443e19", cert.ZoneID)
|
||||||
|
key := "test-service-key"
|
||||||
|
assert.Equal(t, key, cert.APIToken)
|
||||||
|
}
|
||||||
|
|
||||||
|
type mockFile struct {
|
||||||
|
path string
|
||||||
|
data []byte
|
||||||
|
err error
|
||||||
|
}
|
||||||
|
|
||||||
|
type mockFileSystem struct {
|
||||||
|
files map[string]mockFile
|
||||||
|
}
|
||||||
|
|
||||||
|
func newMockFileSystem(files ...mockFile) *mockFileSystem {
|
||||||
|
fs := mockFileSystem{map[string]mockFile{}}
|
||||||
|
for _, f := range files {
|
||||||
|
fs.files[f.path] = f
|
||||||
|
}
|
||||||
|
return &fs
|
||||||
|
}
|
||||||
|
|
||||||
|
func (fs *mockFileSystem) ReadFile(path string) ([]byte, error) {
|
||||||
|
if f, ok := fs.files[path]; ok {
|
||||||
|
return f.data, f.err
|
||||||
|
}
|
||||||
|
return nil, os.ErrNotExist
|
||||||
|
}
|
||||||
|
|
||||||
|
func (fs *mockFileSystem) ValidFilePath(path string) bool {
|
||||||
|
_, exists := fs.files[path]
|
||||||
|
return exists
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestFindOriginCert_Valid(t *testing.T) {
|
||||||
|
file, err := os.ReadFile("test-cloudflare-tunnel-cert-json.pem")
|
||||||
|
require.NoError(t, err)
|
||||||
|
dir := t.TempDir()
|
||||||
|
certPath := path.Join(dir, originCertFile)
|
||||||
|
os.WriteFile(certPath, file, fs.ModePerm)
|
||||||
|
path, err := FindOriginCert(certPath, &nopLog)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Equal(t, certPath, path)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestFindOriginCert_Missing(t *testing.T) {
|
||||||
|
dir := t.TempDir()
|
||||||
|
certPath := path.Join(dir, originCertFile)
|
||||||
|
_, err := FindOriginCert(certPath, &nopLog)
|
||||||
|
require.Error(t, err)
|
||||||
|
}
|
|
@ -51,7 +51,6 @@ K5rShE/l+90YAOzHC89OH/wUz3I5KYOFuehoAiEA8e92aIf9XBkr0K6EvFCiSsD+
|
||||||
x+Yo/cL8fGfVpPt4UM8=
|
x+Yo/cL8fGfVpPt4UM8=
|
||||||
-----END CERTIFICATE-----
|
-----END CERTIFICATE-----
|
||||||
-----BEGIN ARGO TUNNEL TOKEN-----
|
-----BEGIN ARGO TUNNEL TOKEN-----
|
||||||
eyJ6b25lSUQiOiAiN2IwYTRkNzdkZmI4ODFjMWEzYjdkNjFlYTk0NDNlMTkiLCAi
|
eyJ6b25lSUQiOiAiN2IwYTRkNzdkZmI4ODFjMWEzYjdkNjFlYTk0NDNlMTkiLCAiYWNjb3VudElE
|
||||||
c2VydmljZUtleSI6ICJ0ZXN0LXNlcnZpY2Uta2V5IiwgImFjY291bnRJRCI6ICJh
|
IjogImFiY2RhYmNkYWJjZGFiY2QxMjM0NTY3ODkwYWJjZGVmIn0=
|
||||||
YmNkYWJjZGFiY2RhYmNkMTIzNDU2Nzg5MGFiY2RlZiJ9
|
|
||||||
-----END ARGO TUNNEL TOKEN-----
|
-----END ARGO TUNNEL TOKEN-----
|
|
@ -50,7 +50,7 @@ cmUuY29tL29yaWdpbl9lY2NfY2EuY3JsMAoGCCqGSM49BAMCA0gAMEUCIDV7HoMj
|
||||||
K5rShE/l+90YAOzHC89OH/wUz3I5KYOFuehoAiEA8e92aIf9XBkr0K6EvFCiSsD+
|
K5rShE/l+90YAOzHC89OH/wUz3I5KYOFuehoAiEA8e92aIf9XBkr0K6EvFCiSsD+
|
||||||
x+Yo/cL8fGfVpPt4UM8=
|
x+Yo/cL8fGfVpPt4UM8=
|
||||||
-----END CERTIFICATE-----
|
-----END CERTIFICATE-----
|
||||||
-----BEGIN WARP TOKEN-----
|
-----BEGIN ARGO TUNNEL TOKEN-----
|
||||||
N2IwYTRkNzdkZmI4ODFjMWEzYjdkNjFlYTk0NDNlMTkKdjEuMC01OGJkNGY5ZTI4
|
N2IwYTRkNzdkZmI4ODFjMWEzYjdkNjFlYTk0NDNlMTkKdjEuMC01OGJkNGY5ZTI4
|
||||||
ZjdiM2MyOGUwNWEzNWZmM2U4MGFiNGZkOTY0NGVmM2ZlY2U1MzdlYjBkMTJlMmU5
|
ZjdiM2MyOGUwNWEzNWZmM2U4MGFiNGZkOTY0NGVmM2ZlY2U1MzdlYjBkMTJlMmU5
|
||||||
MjU4MjE3LTE4MzQ0MmZiYjBiYmRiM2U1NzE1NThmZWM5YjU1ODllYmQ3N2FhZmM4
|
MjU4MjE3LTE4MzQ0MmZiYjBiYmRiM2U1NzE1NThmZWM5YjU1ODllYmQ3N2FhZmM4
|
||||||
|
@ -58,7 +58,7 @@ NzQ5OGVlM2YwOWY2NGE0YWQ3OWZmZTg3OTFlZGJhZTA4YjM2YzFkOGYxZDcwYTg2
|
||||||
NzBkZTU2OTIyZGZmOTJiMTVkMjE0YTUyNGY0ZWJmYTE5NTg4NTllLTdjZTgwZjc5
|
NzBkZTU2OTIyZGZmOTJiMTVkMjE0YTUyNGY0ZWJmYTE5NTg4NTllLTdjZTgwZjc5
|
||||||
OTIxMzEyYTYwMjJjNWQyNWUyZDM4MGY4MmNlYWVmZTNmYmRjNDNkZDEzYjA4MGUz
|
OTIxMzEyYTYwMjJjNWQyNWUyZDM4MGY4MmNlYWVmZTNmYmRjNDNkZDEzYjA4MGUz
|
||||||
ZWYxZTI2Zjc=
|
ZWYxZTI2Zjc=
|
||||||
-----END WARP TOKEN-----
|
-----END ARGO TUNNEL TOKEN-----
|
||||||
-----BEGIN RSA PRIVATE KEY-----
|
-----BEGIN RSA PRIVATE KEY-----
|
||||||
MIIEvwIBADANBgkqhkiG9w0BAQEFAASCBKkwggSlAgEAAoIBAQCfGswL16Fz9Ei3
|
MIIEvwIBADANBgkqhkiG9w0BAQEFAASCBKkwggSlAgEAAoIBAQCfGswL16Fz9Ei3
|
||||||
sAg5AmBizoN2nZdyXHP8T57UxUMcrlJXEEXCVS5RR4m9l+EmK0ng6yHR1H5oX1Lg
|
sAg5AmBizoN2nZdyXHP8T57UxUMcrlJXEEXCVS5RR4m9l+EmK0ng6yHR1H5oX1Lg
|
|
@ -51,6 +51,7 @@ K5rShE/l+90YAOzHC89OH/wUz3I5KYOFuehoAiEA8e92aIf9XBkr0K6EvFCiSsD+
|
||||||
x+Yo/cL8fGfVpPt4UM8=
|
x+Yo/cL8fGfVpPt4UM8=
|
||||||
-----END CERTIFICATE-----
|
-----END CERTIFICATE-----
|
||||||
-----BEGIN ARGO TUNNEL TOKEN-----
|
-----BEGIN ARGO TUNNEL TOKEN-----
|
||||||
N2IwYTRkNzdkZmI4ODFjMWEzYjdkNjFlYTk0NDNlMTkKdGVzdC1zZXJ2aWNlLWtl
|
eyJ6b25lSUQiOiAiN2IwYTRkNzdkZmI4ODFjMWEzYjdkNjFlYTk0NDNlMTkiLCAiYXBpVG9rZW4i
|
||||||
eQ==
|
OiAidGVzdC1zZXJ2aWNlLWtleSIsICJhY2NvdW50SUQiOiAiYWJjZGFiY2RhYmNkYWJjZDEyMzQ1
|
||||||
|
Njc4OTBhYmNkZWYifQ==
|
||||||
-----END ARGO TUNNEL TOKEN-----
|
-----END ARGO TUNNEL TOKEN-----
|
|
@ -9,6 +9,7 @@ import (
|
||||||
"github.com/google/uuid"
|
"github.com/google/uuid"
|
||||||
"github.com/rs/zerolog"
|
"github.com/rs/zerolog"
|
||||||
|
|
||||||
|
"github.com/cloudflare/cloudflared/management"
|
||||||
"github.com/cloudflare/cloudflared/packet"
|
"github.com/cloudflare/cloudflared/packet"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -120,7 +121,9 @@ func (m *manager) registerSession(ctx context.Context, registration *registerSes
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *manager) newSession(id uuid.UUID, dstConn io.ReadWriteCloser) *Session {
|
func (m *manager) newSession(id uuid.UUID, dstConn io.ReadWriteCloser) *Session {
|
||||||
logger := m.log.With().Str("sessionID", id.String()).Logger()
|
logger := m.log.With().
|
||||||
|
Int(management.EventTypeKey, int(management.UDP)).
|
||||||
|
Str("sessionID", id.String()).Logger()
|
||||||
return &Session{
|
return &Session{
|
||||||
ID: id,
|
ID: id,
|
||||||
sendFunc: m.sendFunc,
|
sendFunc: m.sendFunc,
|
||||||
|
|
|
@ -9,6 +9,8 @@ import (
|
||||||
|
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
"github.com/rs/zerolog"
|
"github.com/rs/zerolog"
|
||||||
|
|
||||||
|
"github.com/cloudflare/cloudflared/management"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
@ -41,6 +43,19 @@ const (
|
||||||
IPv6Only ConfigIPVersion = 6
|
IPv6Only ConfigIPVersion = 6
|
||||||
)
|
)
|
||||||
|
|
||||||
|
func (c ConfigIPVersion) String() string {
|
||||||
|
switch c {
|
||||||
|
case Auto:
|
||||||
|
return "auto"
|
||||||
|
case IPv4Only:
|
||||||
|
return "4"
|
||||||
|
case IPv6Only:
|
||||||
|
return "6"
|
||||||
|
default:
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// IPVersion is the IP version of an EdgeAddr
|
// IPVersion is the IP version of an EdgeAddr
|
||||||
type EdgeIPVersion int8
|
type EdgeIPVersion int8
|
||||||
|
|
||||||
|
@ -95,16 +110,20 @@ var friendlyDNSErrorLines = []string{
|
||||||
|
|
||||||
// EdgeDiscovery implements HA service discovery lookup.
|
// EdgeDiscovery implements HA service discovery lookup.
|
||||||
func edgeDiscovery(log *zerolog.Logger, srvService string) ([][]*EdgeAddr, error) {
|
func edgeDiscovery(log *zerolog.Logger, srvService string) ([][]*EdgeAddr, error) {
|
||||||
log.Debug().Str("domain", "_"+srvService+"._"+srvProto+"."+srvName).Msg("looking up edge SRV record")
|
logger := log.With().Int(management.EventTypeKey, int(management.Cloudflared)).Logger()
|
||||||
|
logger.Debug().
|
||||||
|
Int(management.EventTypeKey, int(management.Cloudflared)).
|
||||||
|
Str("domain", "_"+srvService+"._"+srvProto+"."+srvName).
|
||||||
|
Msg("edge discovery: looking up edge SRV record")
|
||||||
|
|
||||||
_, addrs, err := netLookupSRV(srvService, srvProto, srvName)
|
_, addrs, err := netLookupSRV(srvService, srvProto, srvName)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
_, fallbackAddrs, fallbackErr := fallbackLookupSRV(srvService, srvProto, srvName)
|
_, fallbackAddrs, fallbackErr := fallbackLookupSRV(srvService, srvProto, srvName)
|
||||||
if fallbackErr != nil || len(fallbackAddrs) == 0 {
|
if fallbackErr != nil || len(fallbackAddrs) == 0 {
|
||||||
// use the original DNS error `err` in messages, not `fallbackErr`
|
// use the original DNS error `err` in messages, not `fallbackErr`
|
||||||
log.Err(err).Msg("Error looking up Cloudflare edge IPs: the DNS query failed")
|
logger.Err(err).Msg("edge discovery: error looking up Cloudflare edge IPs: the DNS query failed")
|
||||||
for _, s := range friendlyDNSErrorLines {
|
for _, s := range friendlyDNSErrorLines {
|
||||||
log.Error().Msg(s)
|
logger.Error().Msg(s)
|
||||||
}
|
}
|
||||||
return nil, errors.Wrapf(err, "Could not lookup srv records on _%v._%v.%v", srvService, srvProto, srvName)
|
return nil, errors.Wrapf(err, "Could not lookup srv records on _%v._%v.%v", srvService, srvProto, srvName)
|
||||||
}
|
}
|
||||||
|
@ -118,9 +137,13 @@ func edgeDiscovery(log *zerolog.Logger, srvService string) ([][]*EdgeAddr, error
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
for _, e := range edgeAddrs {
|
logAddrs := make([]string, len(edgeAddrs))
|
||||||
log.Debug().Msgf("Edge Address: %+v", *e)
|
for i, e := range edgeAddrs {
|
||||||
|
logAddrs[i] = e.UDP.IP.String()
|
||||||
}
|
}
|
||||||
|
logger.Debug().
|
||||||
|
Strs("addresses", logAddrs).
|
||||||
|
Msg("edge discovery: resolved edge addresses")
|
||||||
resolvedAddrPerCNAME = append(resolvedAddrPerCNAME, edgeAddrs)
|
resolvedAddrPerCNAME = append(resolvedAddrPerCNAME, edgeAddrs)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -175,13 +198,15 @@ func ResolveAddrs(addrs []string, log *zerolog.Logger) (resolved []*EdgeAddr) {
|
||||||
for _, addr := range addrs {
|
for _, addr := range addrs {
|
||||||
tcpAddr, err := net.ResolveTCPAddr("tcp", addr)
|
tcpAddr, err := net.ResolveTCPAddr("tcp", addr)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Error().Str(logFieldAddress, addr).Err(err).Msg("failed to resolve to TCP address")
|
log.Error().Int(management.EventTypeKey, int(management.Cloudflared)).
|
||||||
|
Str(logFieldAddress, addr).Err(err).Msg("edge discovery: failed to resolve to TCP address")
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
udpAddr, err := net.ResolveUDPAddr("udp", addr)
|
udpAddr, err := net.ResolveUDPAddr("udp", addr)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Error().Str(logFieldAddress, addr).Err(err).Msg("failed to resolve to UDP address")
|
log.Error().Int(management.EventTypeKey, int(management.Cloudflared)).
|
||||||
|
Str(logFieldAddress, addr).Err(err).Msg("edge discovery: failed to resolve to UDP address")
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
version := V6
|
version := V6
|
||||||
|
|
|
@ -2,6 +2,7 @@ package allregions
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"math/rand"
|
||||||
|
|
||||||
"github.com/rs/zerolog"
|
"github.com/rs/zerolog"
|
||||||
)
|
)
|
||||||
|
@ -85,6 +86,15 @@ func (rs *Regions) AddrUsedBy(connID int) *EdgeAddr {
|
||||||
// GetUnusedAddr gets an unused addr from the edge, excluding the given addr. Prefer to use addresses
|
// GetUnusedAddr gets an unused addr from the edge, excluding the given addr. Prefer to use addresses
|
||||||
// evenly across both regions.
|
// evenly across both regions.
|
||||||
func (rs *Regions) GetUnusedAddr(excluding *EdgeAddr, connID int) *EdgeAddr {
|
func (rs *Regions) GetUnusedAddr(excluding *EdgeAddr, connID int) *EdgeAddr {
|
||||||
|
// If both regions have the same number of available addrs, lets randomise which one
|
||||||
|
// we pick. The rest of this algorithm will continue to make sure we always use addresses
|
||||||
|
// evenly across both regions.
|
||||||
|
if rs.region1.AvailableAddrs() == rs.region2.AvailableAddrs() {
|
||||||
|
regions := []Region{rs.region1, rs.region2}
|
||||||
|
firstChoice := rand.Intn(2)
|
||||||
|
return getAddrs(excluding, connID, ®ions[firstChoice], ®ions[1-firstChoice])
|
||||||
|
}
|
||||||
|
|
||||||
if rs.region1.AvailableAddrs() > rs.region2.AvailableAddrs() {
|
if rs.region1.AvailableAddrs() > rs.region2.AvailableAddrs() {
|
||||||
return getAddrs(excluding, connID, &rs.region1, &rs.region2)
|
return getAddrs(excluding, connID, &rs.region1, &rs.region2)
|
||||||
}
|
}
|
||||||
|
|
|
@ -15,12 +15,16 @@ func DialEdge(
|
||||||
timeout time.Duration,
|
timeout time.Duration,
|
||||||
tlsConfig *tls.Config,
|
tlsConfig *tls.Config,
|
||||||
edgeTCPAddr *net.TCPAddr,
|
edgeTCPAddr *net.TCPAddr,
|
||||||
|
localIP net.IP,
|
||||||
) (net.Conn, error) {
|
) (net.Conn, error) {
|
||||||
// Inherit from parent context so we can cancel (Ctrl-C) while dialing
|
// Inherit from parent context so we can cancel (Ctrl-C) while dialing
|
||||||
dialCtx, dialCancel := context.WithTimeout(ctx, timeout)
|
dialCtx, dialCancel := context.WithTimeout(ctx, timeout)
|
||||||
defer dialCancel()
|
defer dialCancel()
|
||||||
|
|
||||||
dialer := net.Dialer{}
|
dialer := net.Dialer{}
|
||||||
|
if localIP != nil {
|
||||||
|
dialer.LocalAddr = &net.TCPAddr{IP: localIP, Port: 0}
|
||||||
|
}
|
||||||
edgeConn, err := dialer.DialContext(dialCtx, "tcp", edgeTCPAddr.String())
|
edgeConn, err := dialer.DialContext(dialCtx, "tcp", edgeTCPAddr.String())
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, newDialError(err, "DialContext error")
|
return nil, newDialError(err, "DialContext error")
|
||||||
|
|
|
@ -6,6 +6,7 @@ import (
|
||||||
"github.com/rs/zerolog"
|
"github.com/rs/zerolog"
|
||||||
|
|
||||||
"github.com/cloudflare/cloudflared/edgediscovery/allregions"
|
"github.com/cloudflare/cloudflared/edgediscovery/allregions"
|
||||||
|
"github.com/cloudflare/cloudflared/management"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
@ -74,33 +75,35 @@ func (ed *Edge) GetAddrForRPC() (*allregions.EdgeAddr, error) {
|
||||||
|
|
||||||
// GetAddr gives this proxy connection an edge Addr. Prefer Addrs this connection has already used.
|
// GetAddr gives this proxy connection an edge Addr. Prefer Addrs this connection has already used.
|
||||||
func (ed *Edge) GetAddr(connIndex int) (*allregions.EdgeAddr, error) {
|
func (ed *Edge) GetAddr(connIndex int) (*allregions.EdgeAddr, error) {
|
||||||
log := ed.log.With().Int(LogFieldConnIndex, connIndex).Logger()
|
log := ed.log.With().
|
||||||
|
Int(LogFieldConnIndex, connIndex).
|
||||||
|
Int(management.EventTypeKey, int(management.Cloudflared)).
|
||||||
|
Logger()
|
||||||
ed.Lock()
|
ed.Lock()
|
||||||
defer ed.Unlock()
|
defer ed.Unlock()
|
||||||
|
|
||||||
// If this connection has already used an edge addr, return it.
|
// If this connection has already used an edge addr, return it.
|
||||||
if addr := ed.regions.AddrUsedBy(connIndex); addr != nil {
|
if addr := ed.regions.AddrUsedBy(connIndex); addr != nil {
|
||||||
log.Debug().Msg("edgediscovery - GetAddr: Returning same address back to proxy connection")
|
log.Debug().IPAddr(LogFieldIPAddress, addr.UDP.IP).Msg("edge discovery: returning same edge address back to pool")
|
||||||
return addr, nil
|
return addr, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Otherwise, give it an unused one
|
// Otherwise, give it an unused one
|
||||||
addr := ed.regions.GetUnusedAddr(nil, connIndex)
|
addr := ed.regions.GetUnusedAddr(nil, connIndex)
|
||||||
if addr == nil {
|
if addr == nil {
|
||||||
log.Debug().Msg("edgediscovery - GetAddr: No addresses left to give proxy connection")
|
log.Debug().Msg("edge discovery: no addresses left in pool to give proxy connection")
|
||||||
return nil, errNoAddressesLeft
|
return nil, errNoAddressesLeft
|
||||||
}
|
}
|
||||||
log = ed.log.With().
|
log.Debug().IPAddr(LogFieldIPAddress, addr.UDP.IP).Msg("edge discovery: giving new address to connection")
|
||||||
Int(LogFieldConnIndex, connIndex).
|
|
||||||
IPAddr(LogFieldIPAddress, addr.UDP.IP).Logger()
|
|
||||||
log.Debug().Msgf("edgediscovery - GetAddr: Giving connection its new address")
|
|
||||||
return addr, nil
|
return addr, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetDifferentAddr gives back the proxy connection's edge Addr and uses a new one.
|
// GetDifferentAddr gives back the proxy connection's edge Addr and uses a new one.
|
||||||
func (ed *Edge) GetDifferentAddr(connIndex int, hasConnectivityError bool) (*allregions.EdgeAddr, error) {
|
func (ed *Edge) GetDifferentAddr(connIndex int, hasConnectivityError bool) (*allregions.EdgeAddr, error) {
|
||||||
log := ed.log.With().Int(LogFieldConnIndex, connIndex).Logger()
|
log := ed.log.With().
|
||||||
|
Int(LogFieldConnIndex, connIndex).
|
||||||
|
Int(management.EventTypeKey, int(management.Cloudflared)).
|
||||||
|
Logger()
|
||||||
ed.Lock()
|
ed.Lock()
|
||||||
defer ed.Unlock()
|
defer ed.Unlock()
|
||||||
|
|
||||||
|
@ -110,14 +113,14 @@ func (ed *Edge) GetDifferentAddr(connIndex int, hasConnectivityError bool) (*all
|
||||||
}
|
}
|
||||||
addr := ed.regions.GetUnusedAddr(oldAddr, connIndex)
|
addr := ed.regions.GetUnusedAddr(oldAddr, connIndex)
|
||||||
if addr == nil {
|
if addr == nil {
|
||||||
log.Debug().Msg("edgediscovery - GetDifferentAddr: No addresses left to give proxy connection")
|
log.Debug().Msg("edge discovery: no addresses left in pool to give proxy connection")
|
||||||
// note: if oldAddr were not nil, it will become available on the next iteration
|
// note: if oldAddr were not nil, it will become available on the next iteration
|
||||||
return nil, errNoAddressesLeft
|
return nil, errNoAddressesLeft
|
||||||
}
|
}
|
||||||
log = ed.log.With().
|
log.Debug().
|
||||||
Int(LogFieldConnIndex, connIndex).
|
IPAddr(LogFieldIPAddress, addr.UDP.IP).
|
||||||
IPAddr(LogFieldIPAddress, addr.UDP.IP).Logger()
|
Int("available", ed.regions.AvailableAddrs()).
|
||||||
log.Debug().Msgf("edgediscovery - GetDifferentAddr: Giving connection its new address from the address list: %v", ed.regions.AvailableAddrs())
|
Msg("edge discovery: giving new address to connection")
|
||||||
return addr, nil
|
return addr, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -133,8 +136,9 @@ func (ed *Edge) AvailableAddrs() int {
|
||||||
func (ed *Edge) GiveBack(addr *allregions.EdgeAddr, hasConnectivityError bool) bool {
|
func (ed *Edge) GiveBack(addr *allregions.EdgeAddr, hasConnectivityError bool) bool {
|
||||||
ed.Lock()
|
ed.Lock()
|
||||||
defer ed.Unlock()
|
defer ed.Unlock()
|
||||||
log := ed.log.With().
|
ed.log.Debug().
|
||||||
IPAddr(LogFieldIPAddress, addr.UDP.IP).Logger()
|
Int(management.EventTypeKey, int(management.Cloudflared)).
|
||||||
log.Debug().Msgf("edgediscovery - GiveBack: Address now unused")
|
IPAddr(LogFieldIPAddress, addr.UDP.IP).
|
||||||
|
Msg("edge discovery: gave back address to the pool")
|
||||||
return ed.regions.GiveBack(addr, hasConnectivityError)
|
return ed.regions.GiveBack(addr, hasConnectivityError)
|
||||||
}
|
}
|
||||||
|
|
|
@ -15,6 +15,8 @@ var (
|
||||||
errNoProtocolRecord = fmt.Errorf("No TXT record found for %s to determine connection protocol", protocolRecord)
|
errNoProtocolRecord = fmt.Errorf("No TXT record found for %s to determine connection protocol", protocolRecord)
|
||||||
)
|
)
|
||||||
|
|
||||||
|
type PercentageFetcher func() (ProtocolPercents, error)
|
||||||
|
|
||||||
// ProtocolPercent represents a single Protocol Percentage combination.
|
// ProtocolPercent represents a single Protocol Percentage combination.
|
||||||
type ProtocolPercent struct {
|
type ProtocolPercent struct {
|
||||||
Protocol string `json:"protocol"`
|
Protocol string `json:"protocol"`
|
||||||
|
|
|
@ -0,0 +1,30 @@
|
||||||
|
package features
|
||||||
|
|
||||||
|
const (
|
||||||
|
FeatureSerializedHeaders = "serialized_headers"
|
||||||
|
FeatureQuickReconnects = "quick_reconnects"
|
||||||
|
FeatureAllowRemoteConfig = "allow_remote_config"
|
||||||
|
FeatureDatagramV2 = "support_datagram_v2"
|
||||||
|
FeaturePostQuantum = "postquantum"
|
||||||
|
FeatureQUICSupportEOF = "support_quic_eof"
|
||||||
|
FeatureManagementLogs = "management_logs"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
DefaultFeatures = []string{
|
||||||
|
FeatureAllowRemoteConfig,
|
||||||
|
FeatureSerializedHeaders,
|
||||||
|
FeatureDatagramV2,
|
||||||
|
FeatureQUICSupportEOF,
|
||||||
|
FeatureManagementLogs,
|
||||||
|
}
|
||||||
|
)
|
||||||
|
|
||||||
|
func Contains(feature string) bool {
|
||||||
|
for _, f := range DefaultFeatures {
|
||||||
|
if f == feature {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
|
@ -166,6 +166,17 @@ def parse_args():
|
||||||
|
|
||||||
def upload_asset(release, filepath, filename, release_version, kv_account_id, namespace_id, kv_api_token):
|
def upload_asset(release, filepath, filename, release_version, kv_account_id, namespace_id, kv_api_token):
|
||||||
logging.info("Uploading asset: %s", filename)
|
logging.info("Uploading asset: %s", filename)
|
||||||
|
assets = release.get_assets()
|
||||||
|
uploaded = False
|
||||||
|
for asset in assets:
|
||||||
|
if asset.name == filename:
|
||||||
|
uploaded = True
|
||||||
|
break
|
||||||
|
|
||||||
|
if uploaded:
|
||||||
|
logging.info("asset already uploaded, skipping upload")
|
||||||
|
return
|
||||||
|
|
||||||
release.upload_asset(filepath, name=filename)
|
release.upload_asset(filepath, name=filename)
|
||||||
|
|
||||||
# check and extract if the file is a tar and gzipped file (as is the case with the macos builds)
|
# check and extract if the file is a tar and gzipped file (as is the case with the macos builds)
|
||||||
|
@ -182,9 +193,11 @@ def upload_asset(release, filepath, filename, release_version, kv_account_id, na
|
||||||
binary_path = os.path.join(os.getcwd(), 'cfd', 'cloudflared')
|
binary_path = os.path.join(os.getcwd(), 'cfd', 'cloudflared')
|
||||||
|
|
||||||
# send the sha256 (the checksum) to workers kv
|
# send the sha256 (the checksum) to workers kv
|
||||||
|
logging.info("Uploading sha256 checksum for: %s", filename)
|
||||||
pkg_hash = get_sha256(binary_path)
|
pkg_hash = get_sha256(binary_path)
|
||||||
send_hash(pkg_hash, filename, release_version, kv_account_id, namespace_id, kv_api_token)
|
send_hash(pkg_hash, filename, release_version, kv_account_id, namespace_id, kv_api_token)
|
||||||
|
|
||||||
|
def move_asset(filepath, filename):
|
||||||
# create the artifacts directory if it doesn't exist
|
# create the artifacts directory if it doesn't exist
|
||||||
artifact_path = os.path.join(os.getcwd(), 'artifacts')
|
artifact_path = os.path.join(os.getcwd(), 'artifacts')
|
||||||
if not os.path.isdir(artifact_path):
|
if not os.path.isdir(artifact_path):
|
||||||
|
@ -215,6 +228,7 @@ def main():
|
||||||
binary_path = os.path.join(args.path, filename)
|
binary_path = os.path.join(args.path, filename)
|
||||||
upload_asset(release, binary_path, filename, args.release_version, args.kv_account_id, args.namespace_id,
|
upload_asset(release, binary_path, filename, args.release_version, args.kv_account_id, args.namespace_id,
|
||||||
args.kv_api_token)
|
args.kv_api_token)
|
||||||
|
move_asset(binary_path, filename)
|
||||||
else:
|
else:
|
||||||
upload_asset(release, args.path, args.name, args.release_version, args.kv_account_id, args.namespace_id,
|
upload_asset(release, args.path, args.name, args.release_version, args.kv_account_id, args.namespace_id,
|
||||||
args.kv_api_token)
|
args.kv_api_token)
|
||||||
|
|
65
go.mod
65
go.mod
|
@ -5,28 +5,30 @@ go 1.19
|
||||||
require (
|
require (
|
||||||
github.com/cloudflare/brotli-go v0.0.0-20191101163834-d34379f7ff93
|
github.com/cloudflare/brotli-go v0.0.0-20191101163834-d34379f7ff93
|
||||||
github.com/cloudflare/golibs v0.0.0-20170913112048-333127dbecfc
|
github.com/cloudflare/golibs v0.0.0-20170913112048-333127dbecfc
|
||||||
github.com/coredns/coredns v1.8.7
|
github.com/coredns/coredns v1.10.0
|
||||||
github.com/coreos/go-oidc/v3 v3.4.0
|
github.com/coreos/go-oidc/v3 v3.4.0
|
||||||
github.com/coreos/go-systemd v0.0.0-20191104093116-d3cd4ed1dbcf
|
github.com/coreos/go-systemd v0.0.0-20191104093116-d3cd4ed1dbcf
|
||||||
github.com/facebookgo/grace v0.0.0-20180706040059-75cf19382434
|
github.com/facebookgo/grace v0.0.0-20180706040059-75cf19382434
|
||||||
github.com/fsnotify/fsnotify v1.4.9
|
github.com/fsnotify/fsnotify v1.4.9
|
||||||
github.com/getsentry/raven-go v0.0.0-20180517221441-ed7bcb39ff10
|
github.com/getsentry/raven-go v0.2.0
|
||||||
|
github.com/getsentry/sentry-go v0.16.0
|
||||||
|
github.com/go-chi/chi/v5 v5.0.8
|
||||||
|
github.com/go-jose/go-jose/v3 v3.0.0
|
||||||
github.com/gobwas/ws v1.0.4
|
github.com/gobwas/ws v1.0.4
|
||||||
github.com/golang-collections/collections v0.0.0-20130729185459-604e922904d3
|
github.com/golang-collections/collections v0.0.0-20130729185459-604e922904d3
|
||||||
github.com/google/gopacket v1.1.19
|
github.com/google/gopacket v1.1.19
|
||||||
github.com/google/uuid v1.3.0
|
github.com/google/uuid v1.3.0
|
||||||
github.com/gorilla/mux v1.8.0
|
|
||||||
github.com/gorilla/websocket v1.4.2
|
github.com/gorilla/websocket v1.4.2
|
||||||
github.com/json-iterator/go v1.1.12
|
github.com/json-iterator/go v1.1.12
|
||||||
github.com/lucas-clemente/quic-go v0.28.1
|
github.com/lucas-clemente/quic-go v0.28.1
|
||||||
github.com/mattn/go-colorable v0.1.8
|
github.com/mattn/go-colorable v0.1.13
|
||||||
github.com/miekg/dns v1.1.45
|
github.com/miekg/dns v1.1.50
|
||||||
github.com/mitchellh/go-homedir v1.1.0
|
github.com/mitchellh/go-homedir v1.1.0
|
||||||
github.com/pkg/errors v0.9.1
|
github.com/pkg/errors v0.9.1
|
||||||
github.com/prometheus/client_golang v1.12.1
|
github.com/prometheus/client_golang v1.13.0
|
||||||
github.com/prometheus/client_model v0.2.0
|
github.com/prometheus/client_model v0.2.0
|
||||||
github.com/rs/zerolog v1.20.0
|
github.com/rs/zerolog v1.20.0
|
||||||
github.com/stretchr/testify v1.7.1
|
github.com/stretchr/testify v1.8.1
|
||||||
github.com/urfave/cli/v2 v2.3.0
|
github.com/urfave/cli/v2 v2.3.0
|
||||||
go.opentelemetry.io/contrib/propagators v0.22.0
|
go.opentelemetry.io/contrib/propagators v0.22.0
|
||||||
go.opentelemetry.io/otel v1.6.3
|
go.opentelemetry.io/otel v1.6.3
|
||||||
|
@ -35,24 +37,25 @@ require (
|
||||||
go.opentelemetry.io/otel/trace v1.6.3
|
go.opentelemetry.io/otel/trace v1.6.3
|
||||||
go.opentelemetry.io/proto/otlp v0.15.0
|
go.opentelemetry.io/proto/otlp v0.15.0
|
||||||
go.uber.org/automaxprocs v1.4.0
|
go.uber.org/automaxprocs v1.4.0
|
||||||
golang.org/x/crypto v0.2.0
|
golang.org/x/crypto v0.8.0
|
||||||
golang.org/x/net v0.2.0
|
golang.org/x/net v0.9.0
|
||||||
golang.org/x/sync v0.1.0
|
golang.org/x/sync v0.1.0
|
||||||
golang.org/x/sys v0.2.0
|
golang.org/x/sys v0.7.0
|
||||||
golang.org/x/term v0.2.0
|
golang.org/x/term v0.7.0
|
||||||
google.golang.org/protobuf v1.28.0
|
google.golang.org/protobuf v1.28.1
|
||||||
gopkg.in/coreos/go-oidc.v2 v2.2.1
|
gopkg.in/coreos/go-oidc.v2 v2.2.1
|
||||||
gopkg.in/natefinch/lumberjack.v2 v2.0.0
|
gopkg.in/natefinch/lumberjack.v2 v2.0.0
|
||||||
gopkg.in/square/go-jose.v2 v2.6.0
|
gopkg.in/square/go-jose.v2 v2.6.0
|
||||||
gopkg.in/yaml.v3 v3.0.1
|
gopkg.in/yaml.v3 v3.0.1
|
||||||
|
nhooyr.io/websocket v1.8.7
|
||||||
zombiezen.com/go/capnproto2 v2.18.0+incompatible
|
zombiezen.com/go/capnproto2 v2.18.0+incompatible
|
||||||
)
|
)
|
||||||
|
|
||||||
require (
|
require (
|
||||||
github.com/BurntSushi/toml v0.3.1 // indirect
|
github.com/BurntSushi/toml v1.2.0 // indirect
|
||||||
github.com/apparentlymart/go-cidr v1.1.0 // indirect
|
github.com/apparentlymart/go-cidr v1.1.0 // indirect
|
||||||
github.com/beorn7/perks v1.0.1 // indirect
|
github.com/beorn7/perks v1.0.1 // indirect
|
||||||
github.com/certifi/gocertifi v0.0.0-20200211180108-c7c1fbc02894 // indirect
|
github.com/certifi/gocertifi v0.0.0-20210507211836-431795d63e8d // indirect
|
||||||
github.com/cespare/xxhash/v2 v2.1.2 // indirect
|
github.com/cespare/xxhash/v2 v2.1.2 // indirect
|
||||||
github.com/cheekybits/genny v1.0.0 // indirect
|
github.com/cheekybits/genny v1.0.0 // indirect
|
||||||
github.com/cloudflare/circl v1.2.1-0.20220809205628-0a9554f37a47 // indirect
|
github.com/cloudflare/circl v1.2.1-0.20220809205628-0a9554f37a47 // indirect
|
||||||
|
@ -72,30 +75,34 @@ require (
|
||||||
github.com/golang/protobuf v1.5.2 // indirect
|
github.com/golang/protobuf v1.5.2 // indirect
|
||||||
github.com/grpc-ecosystem/grpc-gateway/v2 v2.7.0 // indirect
|
github.com/grpc-ecosystem/grpc-gateway/v2 v2.7.0 // indirect
|
||||||
github.com/grpc-ecosystem/grpc-opentracing v0.0.0-20180507213350-8e809c8a8645 // indirect
|
github.com/grpc-ecosystem/grpc-opentracing v0.0.0-20180507213350-8e809c8a8645 // indirect
|
||||||
|
github.com/klauspost/compress v1.15.11 // indirect
|
||||||
|
github.com/kr/text v0.2.0 // indirect
|
||||||
github.com/kylelemons/godebug v1.1.0 // indirect
|
github.com/kylelemons/godebug v1.1.0 // indirect
|
||||||
github.com/marten-seemann/qtls-go1-16 v0.1.5 // indirect
|
github.com/marten-seemann/qtls-go1-16 v0.1.5 // indirect
|
||||||
github.com/marten-seemann/qtls-go1-17 v0.1.2 // indirect
|
github.com/marten-seemann/qtls-go1-17 v0.1.2 // indirect
|
||||||
github.com/marten-seemann/qtls-go1-18 v0.1.2 // indirect
|
github.com/marten-seemann/qtls-go1-18 v0.1.2 // indirect
|
||||||
github.com/marten-seemann/qtls-go1-19 v0.1.0-beta.1 // indirect
|
github.com/marten-seemann/qtls-go1-19 v0.1.0-beta.1 // indirect
|
||||||
github.com/mattn/go-isatty v0.0.12 // indirect
|
github.com/mattn/go-isatty v0.0.16 // indirect
|
||||||
github.com/matttproud/golang_protobuf_extensions v1.0.1 // indirect
|
github.com/matttproud/golang_protobuf_extensions v1.0.1 // indirect
|
||||||
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd // indirect
|
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd // indirect
|
||||||
github.com/modern-go/reflect2 v1.0.2 // indirect
|
github.com/modern-go/reflect2 v1.0.2 // indirect
|
||||||
github.com/nxadm/tail v1.4.8 // indirect
|
github.com/nxadm/tail v1.4.8 // indirect
|
||||||
github.com/onsi/ginkgo v1.16.5 // indirect
|
github.com/onsi/ginkgo v1.16.5 // indirect
|
||||||
|
github.com/onsi/gomega v1.23.0 // indirect
|
||||||
github.com/opentracing/opentracing-go v1.2.0 // indirect
|
github.com/opentracing/opentracing-go v1.2.0 // indirect
|
||||||
github.com/pmezard/go-difflib v1.0.0 // indirect
|
github.com/pmezard/go-difflib v1.0.0 // indirect
|
||||||
github.com/pquerna/cachecontrol v0.0.0-20180517163645-1555304b9b35 // indirect
|
github.com/pquerna/cachecontrol v0.0.0-20180517163645-1555304b9b35 // indirect
|
||||||
github.com/prometheus/common v0.32.1 // indirect
|
github.com/prometheus/common v0.37.0 // indirect
|
||||||
github.com/prometheus/procfs v0.7.3 // indirect
|
github.com/prometheus/procfs v0.8.0 // indirect
|
||||||
github.com/russross/blackfriday/v2 v2.1.0 // indirect
|
github.com/russross/blackfriday/v2 v2.1.0 // indirect
|
||||||
golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4 // indirect
|
golang.org/x/mod v0.8.0 // indirect
|
||||||
golang.org/x/oauth2 v0.0.0-20220822191816-0ebed06d0094 // indirect
|
golang.org/x/oauth2 v0.4.0 // indirect
|
||||||
golang.org/x/text v0.4.0 // indirect
|
golang.org/x/text v0.9.0 // indirect
|
||||||
golang.org/x/tools v0.1.12 // indirect
|
golang.org/x/tools v0.6.0 // indirect
|
||||||
google.golang.org/appengine v1.6.7 // indirect
|
google.golang.org/appengine v1.6.7 // indirect
|
||||||
google.golang.org/genproto v0.0.0-20220616135557-88e70c0c3a90 // indirect
|
google.golang.org/genproto v0.0.0-20221202195650-67e5cbc046fd // indirect
|
||||||
google.golang.org/grpc v1.47.0 // indirect
|
google.golang.org/grpc v1.51.0 // indirect
|
||||||
|
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c // indirect
|
||||||
gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7 // indirect
|
gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7 // indirect
|
||||||
gopkg.in/yaml.v2 v2.4.0 // indirect
|
gopkg.in/yaml.v2 v2.4.0 // indirect
|
||||||
)
|
)
|
||||||
|
@ -111,9 +118,11 @@ replace gopkg.in/yaml.v3 => gopkg.in/yaml.v3 v3.0.1
|
||||||
|
|
||||||
// Post-quantum tunnel RTG-1339
|
// Post-quantum tunnel RTG-1339
|
||||||
replace (
|
replace (
|
||||||
// branch go1.18
|
// Branches go1.18 go1.19 go1.20 on github.com/cloudflare/qtls-pq
|
||||||
github.com/marten-seemann/qtls-go1-18 => github.com/cloudflare/qtls-pq v0.0.0-20221010110824-0053225e48b2
|
github.com/marten-seemann/qtls-go1-18 => github.com/cloudflare/qtls-pq v0.0.0-20230103171413-e7a2fb559a0e
|
||||||
|
github.com/marten-seemann/qtls-go1-19 => github.com/cloudflare/qtls-pq v0.0.0-20230103171656-05e84f90909e
|
||||||
// branch go1.19
|
github.com/marten-seemann/qtls-go1-20 => github.com/cloudflare/qtls-pq v0.0.0-20230215110727-8b4e1699c2a8
|
||||||
github.com/marten-seemann/qtls-go1-19 => github.com/cloudflare/qtls-pq v0.0.0-20221010110800-4f3769902fe0
|
github.com/quic-go/qtls-go1-18 => github.com/cloudflare/qtls-pq v0.0.0-20230103171413-e7a2fb559a0e
|
||||||
|
github.com/quic-go/qtls-go1-19 => github.com/cloudflare/qtls-pq v0.0.0-20230103171656-05e84f90909e
|
||||||
|
github.com/quic-go/qtls-go1-20 => github.com/cloudflare/qtls-pq v0.0.0-20230215110727-8b4e1699c2a8
|
||||||
)
|
)
|
||||||
|
|
319
go.sum
319
go.sum
|
@ -61,37 +61,11 @@ dmitri.shuralyov.com/html/belt v0.0.0-20180602232347-f7d459c86be0/go.mod h1:JLBr
|
||||||
dmitri.shuralyov.com/service/change v0.0.0-20181023043359-a85b471d5412/go.mod h1:a1inKt/atXimZ4Mv927x+r7UpyzRUf4emIoiiSC2TN4=
|
dmitri.shuralyov.com/service/change v0.0.0-20181023043359-a85b471d5412/go.mod h1:a1inKt/atXimZ4Mv927x+r7UpyzRUf4emIoiiSC2TN4=
|
||||||
dmitri.shuralyov.com/state v0.0.0-20180228185332-28bcc343414c/go.mod h1:0PRwlb0D6DFvNNtx+9ybjezNCa8XF0xaYcETyp6rHWU=
|
dmitri.shuralyov.com/state v0.0.0-20180228185332-28bcc343414c/go.mod h1:0PRwlb0D6DFvNNtx+9ybjezNCa8XF0xaYcETyp6rHWU=
|
||||||
git.apache.org/thrift.git v0.0.0-20180902110319-2566ecd5d999/go.mod h1:fPE2ZNJGynbRyZ4dJvy6G277gSllfV2HJqblrnkyeyg=
|
git.apache.org/thrift.git v0.0.0-20180902110319-2566ecd5d999/go.mod h1:fPE2ZNJGynbRyZ4dJvy6G277gSllfV2HJqblrnkyeyg=
|
||||||
github.com/Azure/azure-sdk-for-go v61.1.0+incompatible/go.mod h1:9XXNKU+eRnpl9moKnB4QOLf1HestfXbmab5FXxiDBjc=
|
|
||||||
github.com/Azure/go-autorest v14.2.0+incompatible/go.mod h1:r+4oMnoxhatjLLJ6zxSWATqVooLgysK6ZNox3g/xq24=
|
|
||||||
github.com/Azure/go-autorest/autorest v0.11.18/go.mod h1:dSiJPy22c3u0OtOKDNttNgqpNFY/GeWa7GH/Pz56QRA=
|
|
||||||
github.com/Azure/go-autorest/autorest v0.11.19/go.mod h1:dSiJPy22c3u0OtOKDNttNgqpNFY/GeWa7GH/Pz56QRA=
|
|
||||||
github.com/Azure/go-autorest/autorest v0.11.23/go.mod h1:BAWYUWGPEtKPzjVkp0Q6an0MJcJDsoh5Z1BFAEFs4Xs=
|
|
||||||
github.com/Azure/go-autorest/autorest/adal v0.9.5/go.mod h1:B7KF7jKIeC9Mct5spmyCB/A8CG/sEz1vwIRGv/bbw7A=
|
|
||||||
github.com/Azure/go-autorest/autorest/adal v0.9.13/go.mod h1:W/MM4U6nLxnIskrw4UwWzlHfGjwUS50aOsc/I3yuU8M=
|
|
||||||
github.com/Azure/go-autorest/autorest/adal v0.9.14/go.mod h1:W/MM4U6nLxnIskrw4UwWzlHfGjwUS50aOsc/I3yuU8M=
|
|
||||||
github.com/Azure/go-autorest/autorest/adal v0.9.18/go.mod h1:XVVeme+LZwABT8K5Lc3hA4nAe8LDBVle26gTrguhhPQ=
|
|
||||||
github.com/Azure/go-autorest/autorest/azure/auth v0.5.10/go.mod h1:zQXYYNX9kXzRMrJNVXWUfNy38oPMF5/2TeZ4Wylc9fE=
|
|
||||||
github.com/Azure/go-autorest/autorest/azure/cli v0.4.2/go.mod h1:7qkJkT+j6b+hIpzMOwPChJhTqS8VbsqqgULzMNRugoM=
|
|
||||||
github.com/Azure/go-autorest/autorest/date v0.3.0/go.mod h1:BI0uouVdmngYNUzGWeSYnokU+TrmwEsOqdt8Y6sso74=
|
|
||||||
github.com/Azure/go-autorest/autorest/mocks v0.4.1/go.mod h1:LTp+uSrOhSkaKrUy935gNZuuIPPVsHlr9DSOxSayd+k=
|
|
||||||
github.com/Azure/go-autorest/autorest/to v0.2.0/go.mod h1:GunWKJp1AEqgMaGLV+iocmRAJWqST1wQYhyyjXJ3SJc=
|
|
||||||
github.com/Azure/go-autorest/logger v0.2.1/go.mod h1:T9E3cAhj2VqvPOtCYAvby9aBXkZmbF5NWuPV8+WeEW8=
|
|
||||||
github.com/Azure/go-autorest/tracing v0.6.0/go.mod h1:+vhtPC754Xsa23ID7GlGsrdKBpUA79WCAKPPZVC2DeU=
|
|
||||||
github.com/BurntSushi/toml v0.3.1 h1:WXkYYl6Yr3qBf1K79EBnL4mak0OimBfB0XUf9Vl28OQ=
|
|
||||||
github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU=
|
github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU=
|
||||||
|
github.com/BurntSushi/toml v1.2.0 h1:Rt8g24XnyGTyglgET/PRUNlrUeu9F5L+7FilkXfZgs0=
|
||||||
|
github.com/BurntSushi/toml v1.2.0/go.mod h1:CxXYINrC8qIiEnFrOxCa7Jy5BFHlXnUU2pbicEuybxQ=
|
||||||
github.com/BurntSushi/xgb v0.0.0-20160522181843-27f122750802/go.mod h1:IVnqGOEym/WlBOVXweHU+Q+/VP0lqqI8lqeDx9IjBqo=
|
github.com/BurntSushi/xgb v0.0.0-20160522181843-27f122750802/go.mod h1:IVnqGOEym/WlBOVXweHU+Q+/VP0lqqI8lqeDx9IjBqo=
|
||||||
github.com/DataDog/datadog-go v4.4.0+incompatible/go.mod h1:LButxg5PwREeZtORoXG3tL4fMGNddJ+vMq1mwgfaqoQ=
|
|
||||||
github.com/DataDog/gostackparse v0.5.0/go.mod h1:lTfqcJKqS9KnXQGnyQMCugq3u1FP6UZMfWR0aitKFMM=
|
|
||||||
github.com/DataDog/sketches-go v1.0.0/go.mod h1:O+XkJHWk9w4hDwY2ZUDU31ZC9sNYlYo8DiFsxjYeo1k=
|
|
||||||
github.com/Microsoft/go-winio v0.5.0/go.mod h1:JPGBdM1cNvN/6ISo+n8V5iA4v8pBzdOpzfwIujj1a84=
|
|
||||||
github.com/NYTimes/gziphandler v0.0.0-20170623195520-56545f4a5d46/go.mod h1:3wb06e3pkSAbeQ52E9H9iFoQsEEwGN64994WTCIhntQ=
|
|
||||||
github.com/OneOfOne/xxhash v1.2.2/go.mod h1:HSdplMjZKSmBqAxg5vPj2TmRDmfkzw+cTzAElWljhcU=
|
github.com/OneOfOne/xxhash v1.2.2/go.mod h1:HSdplMjZKSmBqAxg5vPj2TmRDmfkzw+cTzAElWljhcU=
|
||||||
github.com/PuerkitoBio/purell v1.1.1/go.mod h1:c11w/QuzBsJSee3cPx9rAFu61PvFxuPbtSwDGJws/X0=
|
|
||||||
github.com/PuerkitoBio/urlesc v0.0.0-20170810143723-de5bf2ad4578/go.mod h1:uGdkoq3SwY9Y+13GIhn11/XLaGBb4BfwItxLd5jeuXE=
|
|
||||||
github.com/Shopify/sarama v1.19.0/go.mod h1:FVkBWblsNy7DGZRfXLU0O9RCGt5g3g3yEuWXgklEdEo=
|
|
||||||
github.com/Shopify/sarama v1.30.0/go.mod h1:zujlQQx1kzHsh4jfV1USnptCQrHAEZ2Hk8fTKCulPVs=
|
|
||||||
github.com/Shopify/toxiproxy v2.1.4+incompatible/go.mod h1:OXgGpZ6Cli1/URJOF1DMxUHB2q5Ap20/P/eIdh4G0pI=
|
|
||||||
github.com/Shopify/toxiproxy/v2 v2.1.6-0.20210914104332-15ea381dcdae/go.mod h1:/cvHQkZ1fst0EmZnA5dFtiQdWCNCFYzb+uE2vqVgvx0=
|
|
||||||
github.com/alecthomas/template v0.0.0-20160405071501-a0175ee3bccc/go.mod h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc=
|
github.com/alecthomas/template v0.0.0-20160405071501-a0175ee3bccc/go.mod h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc=
|
||||||
github.com/alecthomas/template v0.0.0-20190718012654-fb15b899a751/go.mod h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc=
|
github.com/alecthomas/template v0.0.0-20190718012654-fb15b899a751/go.mod h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc=
|
||||||
github.com/alecthomas/units v0.0.0-20151022065526-2efee857e7cf/go.mod h1:ybxpYRFXyAe+OPACYpWeL0wqObRcbAqCMya13uyzqw0=
|
github.com/alecthomas/units v0.0.0-20151022065526-2efee857e7cf/go.mod h1:ybxpYRFXyAe+OPACYpWeL0wqObRcbAqCMya13uyzqw0=
|
||||||
|
@ -101,8 +75,6 @@ github.com/anmitsu/go-shlex v0.0.0-20161002113705-648efa622239/go.mod h1:2FmKhYU
|
||||||
github.com/antihax/optional v1.0.0/go.mod h1:uupD/76wgC+ih3iEmQUL+0Ugr19nfwCT1kdvxnR2qWY=
|
github.com/antihax/optional v1.0.0/go.mod h1:uupD/76wgC+ih3iEmQUL+0Ugr19nfwCT1kdvxnR2qWY=
|
||||||
github.com/apparentlymart/go-cidr v1.1.0 h1:2mAhrMoF+nhXqxTzSZMUzDHkLjmIHC+Zzn4tdgBZjnU=
|
github.com/apparentlymart/go-cidr v1.1.0 h1:2mAhrMoF+nhXqxTzSZMUzDHkLjmIHC+Zzn4tdgBZjnU=
|
||||||
github.com/apparentlymart/go-cidr v1.1.0/go.mod h1:EBcsNrHc3zQeuaeCeCtQruQm+n9/YjEn/vI25Lg7Gwc=
|
github.com/apparentlymart/go-cidr v1.1.0/go.mod h1:EBcsNrHc3zQeuaeCeCtQruQm+n9/YjEn/vI25Lg7Gwc=
|
||||||
github.com/asaskevich/govalidator v0.0.0-20190424111038-f61b66f89f4a/go.mod h1:lB+ZfQJz7igIIfQNfa7Ml4HSf2uFQQRzpGGRXenZAgY=
|
|
||||||
github.com/aws/aws-sdk-go v1.42.30/go.mod h1:OGr6lGMAKGlG9CVrYnWYDKIyb829c6EVBRjxqjmPepc=
|
|
||||||
github.com/beorn7/perks v0.0.0-20180321164747-3a771d992973/go.mod h1:Dwedo/Wpr24TaqPxmxbtue+5NUziq4I4S80YR8gNf3Q=
|
github.com/beorn7/perks v0.0.0-20180321164747-3a771d992973/go.mod h1:Dwedo/Wpr24TaqPxmxbtue+5NUziq4I4S80YR8gNf3Q=
|
||||||
github.com/beorn7/perks v1.0.0/go.mod h1:KWe93zE9D1o94FZ5RNwFwVgaQK1VOXiVxmqh+CedLV8=
|
github.com/beorn7/perks v1.0.0/go.mod h1:KWe93zE9D1o94FZ5RNwFwVgaQK1VOXiVxmqh+CedLV8=
|
||||||
github.com/beorn7/perks v1.0.1 h1:VlbKKnNfV8bJzeqoa4cOKqO6bYr3WgKZxO8Z16+hsOM=
|
github.com/beorn7/perks v1.0.1 h1:VlbKKnNfV8bJzeqoa4cOKqO6bYr3WgKZxO8Z16+hsOM=
|
||||||
|
@ -112,8 +84,8 @@ github.com/buger/jsonparser v0.0.0-20181115193947-bf1c66bbce23/go.mod h1:bbYlZJ7
|
||||||
github.com/bwesterb/go-ristretto v1.2.2/go.mod h1:fUIoIZaG73pV5biE2Blr2xEzDoMj7NFEuV9ekS419A0=
|
github.com/bwesterb/go-ristretto v1.2.2/go.mod h1:fUIoIZaG73pV5biE2Blr2xEzDoMj7NFEuV9ekS419A0=
|
||||||
github.com/cenkalti/backoff/v4 v4.1.2/go.mod h1:scbssz8iZGpm3xbr14ovlUdkxfGXNInqkPWOWmG2CLw=
|
github.com/cenkalti/backoff/v4 v4.1.2/go.mod h1:scbssz8iZGpm3xbr14ovlUdkxfGXNInqkPWOWmG2CLw=
|
||||||
github.com/census-instrumentation/opencensus-proto v0.2.1/go.mod h1:f6KPmirojxKA12rnyqOA5BBL4O983OfeGPqjHWSTneU=
|
github.com/census-instrumentation/opencensus-proto v0.2.1/go.mod h1:f6KPmirojxKA12rnyqOA5BBL4O983OfeGPqjHWSTneU=
|
||||||
github.com/certifi/gocertifi v0.0.0-20200211180108-c7c1fbc02894 h1:JLaf/iINcLyjwbtTsCJjc6rtlASgHeIJPrB6QmwURnA=
|
github.com/certifi/gocertifi v0.0.0-20210507211836-431795d63e8d h1:S2NE3iHSwP0XV47EEXL8mWmRdEfGscSJ+7EgePNgt0s=
|
||||||
github.com/certifi/gocertifi v0.0.0-20200211180108-c7c1fbc02894/go.mod h1:sGbDF6GwGcLpkNXPUTkMRoywsNa/ol15pxFe6ERfguA=
|
github.com/certifi/gocertifi v0.0.0-20210507211836-431795d63e8d/go.mod h1:sGbDF6GwGcLpkNXPUTkMRoywsNa/ol15pxFe6ERfguA=
|
||||||
github.com/cespare/xxhash v1.1.0/go.mod h1:XrSqR1VqqWfGrhpAt58auRo0WTKS1nRRg3ghfAqPWnc=
|
github.com/cespare/xxhash v1.1.0/go.mod h1:XrSqR1VqqWfGrhpAt58auRo0WTKS1nRRg3ghfAqPWnc=
|
||||||
github.com/cespare/xxhash/v2 v2.1.1/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
|
github.com/cespare/xxhash/v2 v2.1.1/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
|
||||||
github.com/cespare/xxhash/v2 v2.1.2 h1:YRXhKfTDauu4ajMg1TPgFO5jnlC2HCbmLXMcTG5cbYE=
|
github.com/cespare/xxhash/v2 v2.1.2 h1:YRXhKfTDauu4ajMg1TPgFO5jnlC2HCbmLXMcTG5cbYE=
|
||||||
|
@ -132,10 +104,10 @@ github.com/cloudflare/circl v1.2.1-0.20220809205628-0a9554f37a47 h1:YzpECHxZ9TzO
|
||||||
github.com/cloudflare/circl v1.2.1-0.20220809205628-0a9554f37a47/go.mod h1:qhx8gBILsYlbam7h09SvHDSkjpe3TfLA7b/z4rxJvkE=
|
github.com/cloudflare/circl v1.2.1-0.20220809205628-0a9554f37a47/go.mod h1:qhx8gBILsYlbam7h09SvHDSkjpe3TfLA7b/z4rxJvkE=
|
||||||
github.com/cloudflare/golibs v0.0.0-20170913112048-333127dbecfc h1:Dvk3ySBsOm5EviLx6VCyILnafPcQinXGP5jbTdHUJgE=
|
github.com/cloudflare/golibs v0.0.0-20170913112048-333127dbecfc h1:Dvk3ySBsOm5EviLx6VCyILnafPcQinXGP5jbTdHUJgE=
|
||||||
github.com/cloudflare/golibs v0.0.0-20170913112048-333127dbecfc/go.mod h1:HlgKKR8V5a1wroIDDIz3/A+T+9Janfq+7n1P5sEFdi0=
|
github.com/cloudflare/golibs v0.0.0-20170913112048-333127dbecfc/go.mod h1:HlgKKR8V5a1wroIDDIz3/A+T+9Janfq+7n1P5sEFdi0=
|
||||||
github.com/cloudflare/qtls-pq v0.0.0-20221010110800-4f3769902fe0 h1:LEsjEHfKnIJEJU9QEIPVRuslxpBu+2kG2DXhxpkGT+o=
|
github.com/cloudflare/qtls-pq v0.0.0-20230103171413-e7a2fb559a0e h1:frfo+L0qloEb6Vj+qjS4pbAYSJQZAlUnKZu0uJoErac=
|
||||||
github.com/cloudflare/qtls-pq v0.0.0-20221010110800-4f3769902fe0/go.mod h1:aIsWqC0WXyUiUxBl/RfxAjDyWE9CCLqvSMnCMTd/+bc=
|
github.com/cloudflare/qtls-pq v0.0.0-20230103171413-e7a2fb559a0e/go.mod h1:mW0BgKFFDAiSmOdUwoORtjo0V2vqw5QzVYRtKQqw/Jg=
|
||||||
github.com/cloudflare/qtls-pq v0.0.0-20221010110824-0053225e48b2 h1:ErNoeVNqFXV+emlf4gY7Ms7/0DbQ8PT2UFxNyWBc51Q=
|
github.com/cloudflare/qtls-pq v0.0.0-20230103171656-05e84f90909e h1:RtQDXvDi0PK3EonP0v7zkE5/rApK4MsgRATCdD+ughg=
|
||||||
github.com/cloudflare/qtls-pq v0.0.0-20221010110824-0053225e48b2/go.mod h1:mW0BgKFFDAiSmOdUwoORtjo0V2vqw5QzVYRtKQqw/Jg=
|
github.com/cloudflare/qtls-pq v0.0.0-20230103171656-05e84f90909e/go.mod h1:aIsWqC0WXyUiUxBl/RfxAjDyWE9CCLqvSMnCMTd/+bc=
|
||||||
github.com/cncf/udpa/go v0.0.0-20191209042840-269d4d468f6f/go.mod h1:M8M6+tZqaGXZJjfX53e64911xZQV5JYwmTeXPW+k8Sc=
|
github.com/cncf/udpa/go v0.0.0-20191209042840-269d4d468f6f/go.mod h1:M8M6+tZqaGXZJjfX53e64911xZQV5JYwmTeXPW+k8Sc=
|
||||||
github.com/cncf/udpa/go v0.0.0-20200629203442-efcf912fb354/go.mod h1:WmhPx2Nbnhtbo57+VJT5O0JRkEi1Wbu0z5j0R8u5Hbk=
|
github.com/cncf/udpa/go v0.0.0-20200629203442-efcf912fb354/go.mod h1:WmhPx2Nbnhtbo57+VJT5O0JRkEi1Wbu0z5j0R8u5Hbk=
|
||||||
github.com/cncf/udpa/go v0.0.0-20201120205902-5459f2c99403/go.mod h1:WmhPx2Nbnhtbo57+VJT5O0JRkEi1Wbu0z5j0R8u5Hbk=
|
github.com/cncf/udpa/go v0.0.0-20201120205902-5459f2c99403/go.mod h1:WmhPx2Nbnhtbo57+VJT5O0JRkEi1Wbu0z5j0R8u5Hbk=
|
||||||
|
@ -147,16 +119,14 @@ github.com/cncf/xds/go v0.0.0-20211001041855-01bcc9b48dfe/go.mod h1:eXthEFrGJvWH
|
||||||
github.com/cncf/xds/go v0.0.0-20211011173535-cb28da3451f1/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs=
|
github.com/cncf/xds/go v0.0.0-20211011173535-cb28da3451f1/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs=
|
||||||
github.com/coredns/caddy v1.1.1 h1:2eYKZT7i6yxIfGP3qLJoJ7HAsDJqYB+X68g4NYjSrE0=
|
github.com/coredns/caddy v1.1.1 h1:2eYKZT7i6yxIfGP3qLJoJ7HAsDJqYB+X68g4NYjSrE0=
|
||||||
github.com/coredns/caddy v1.1.1/go.mod h1:A6ntJQlAWuQfFlsd9hvigKbo2WS0VUs2l1e2F+BawD4=
|
github.com/coredns/caddy v1.1.1/go.mod h1:A6ntJQlAWuQfFlsd9hvigKbo2WS0VUs2l1e2F+BawD4=
|
||||||
github.com/coredns/coredns v1.8.7 h1:wVMjAnyFnY7Mc18AFO+9qbGD6ODPtdVUIlzoWrHr3hk=
|
github.com/coredns/coredns v1.10.0 h1:jCfuWsBjTs0dapkkhISfPCzn5LqvSRtrFtaf/Tjj4DI=
|
||||||
github.com/coredns/coredns v1.8.7/go.mod h1:bFmbgEfeRz5aizL2VsQ5LRlsvJuXWkgG/MWG9zxqjVM=
|
github.com/coredns/coredns v1.10.0/go.mod h1:CIfRU5TgpuoIiJBJ4XrofQzfFQpPFh32ERpUevrSlaw=
|
||||||
github.com/coreos/go-oidc/v3 v3.4.0 h1:xz7elHb/LDwm/ERpwHd+5nb7wFHL32rsr6bBOgaeu6g=
|
github.com/coreos/go-oidc/v3 v3.4.0 h1:xz7elHb/LDwm/ERpwHd+5nb7wFHL32rsr6bBOgaeu6g=
|
||||||
github.com/coreos/go-oidc/v3 v3.4.0/go.mod h1:eHUXhZtXPQLgEaDrOVTgwbgmz1xGOkJNye6h3zkD2Pw=
|
github.com/coreos/go-oidc/v3 v3.4.0/go.mod h1:eHUXhZtXPQLgEaDrOVTgwbgmz1xGOkJNye6h3zkD2Pw=
|
||||||
github.com/coreos/go-semver v0.3.0/go.mod h1:nnelYz7RCh+5ahJtPPxZlU+153eP4D4r3EedlOD2RNk=
|
|
||||||
github.com/coreos/go-systemd v0.0.0-20181012123002-c6f51f82210d/go.mod h1:F5haX7vjVVG0kc13fIWeqUViNPyEJxv/OmvnBo0Yme4=
|
github.com/coreos/go-systemd v0.0.0-20181012123002-c6f51f82210d/go.mod h1:F5haX7vjVVG0kc13fIWeqUViNPyEJxv/OmvnBo0Yme4=
|
||||||
github.com/coreos/go-systemd v0.0.0-20190321100706-95778dfbb74e/go.mod h1:F5haX7vjVVG0kc13fIWeqUViNPyEJxv/OmvnBo0Yme4=
|
github.com/coreos/go-systemd v0.0.0-20190321100706-95778dfbb74e/go.mod h1:F5haX7vjVVG0kc13fIWeqUViNPyEJxv/OmvnBo0Yme4=
|
||||||
github.com/coreos/go-systemd v0.0.0-20191104093116-d3cd4ed1dbcf h1:iW4rZ826su+pqaw19uhpSCzhj44qo35pNgKFGqzDKkU=
|
github.com/coreos/go-systemd v0.0.0-20191104093116-d3cd4ed1dbcf h1:iW4rZ826su+pqaw19uhpSCzhj44qo35pNgKFGqzDKkU=
|
||||||
github.com/coreos/go-systemd v0.0.0-20191104093116-d3cd4ed1dbcf/go.mod h1:F5haX7vjVVG0kc13fIWeqUViNPyEJxv/OmvnBo0Yme4=
|
github.com/coreos/go-systemd v0.0.0-20191104093116-d3cd4ed1dbcf/go.mod h1:F5haX7vjVVG0kc13fIWeqUViNPyEJxv/OmvnBo0Yme4=
|
||||||
github.com/coreos/go-systemd/v22 v22.3.2/go.mod h1:Y58oyj3AT4RCenI/lSvhwexgC+NSVTIJ3seZv2GcEnc=
|
|
||||||
github.com/cpuguy83/go-md2man/v2 v2.0.0-20190314233015-f79a8a8ca69d/go.mod h1:maD7wRr/U5Z6m/iR4s+kqSMx2CaBsrgA7czyZG/E6dU=
|
github.com/cpuguy83/go-md2man/v2 v2.0.0-20190314233015-f79a8a8ca69d/go.mod h1:maD7wRr/U5Z6m/iR4s+kqSMx2CaBsrgA7czyZG/E6dU=
|
||||||
github.com/cpuguy83/go-md2man/v2 v2.0.0 h1:EoUDS0afbrsXAZ9YQ9jdu/mZ2sXgT1/2yyNng4PGlyM=
|
github.com/cpuguy83/go-md2man/v2 v2.0.0 h1:EoUDS0afbrsXAZ9YQ9jdu/mZ2sXgT1/2yyNng4PGlyM=
|
||||||
github.com/cpuguy83/go-md2man/v2 v2.0.0/go.mod h1:maD7wRr/U5Z6m/iR4s+kqSMx2CaBsrgA7czyZG/E6dU=
|
github.com/cpuguy83/go-md2man/v2 v2.0.0/go.mod h1:maD7wRr/U5Z6m/iR4s+kqSMx2CaBsrgA7czyZG/E6dU=
|
||||||
|
@ -164,18 +134,7 @@ github.com/creack/pty v1.1.9/go.mod h1:oKZEueFk5CKHvIhNR5MUki03XCEU+Q6VDXinZuGJ3
|
||||||
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
||||||
github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
|
github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
|
||||||
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
||||||
github.com/dimchansky/utfbom v1.1.0/go.mod h1:rO41eb7gLfo8SF1jd9F8HplJm1Fewwi4mQvIirEdv+8=
|
|
||||||
github.com/dimchansky/utfbom v1.1.1/go.mod h1:SxdoEBH5qIqFocHMyGOXVAybYJdr71b1Q/j0mACtrfE=
|
|
||||||
github.com/dnstap/golang-dnstap v0.4.0/go.mod h1:FqsSdH58NAmkAvKcpyxht7i4FoBjKu8E4JUPt8ipSUs=
|
|
||||||
github.com/docopt/docopt-go v0.0.0-20180111231733-ee0de3bc6815/go.mod h1:WwZ+bS3ebgob9U8Nd0kOddGdZWjyMGR8Wziv+TBNwSE=
|
|
||||||
github.com/dustin/go-humanize v1.0.0/go.mod h1:HtrtbFcZ19U5GC7JDqmcUSB87Iq5E25KnS6fMYU6eOk=
|
github.com/dustin/go-humanize v1.0.0/go.mod h1:HtrtbFcZ19U5GC7JDqmcUSB87Iq5E25KnS6fMYU6eOk=
|
||||||
github.com/eapache/go-resiliency v1.1.0/go.mod h1:kFI+JgMyC7bLPUVY133qvEBtVayf5mFgVsvEsIPBvNs=
|
|
||||||
github.com/eapache/go-resiliency v1.2.0/go.mod h1:kFI+JgMyC7bLPUVY133qvEBtVayf5mFgVsvEsIPBvNs=
|
|
||||||
github.com/eapache/go-xerial-snappy v0.0.0-20180814174437-776d5712da21/go.mod h1:+020luEh2TKB4/GOp8oxxtq0Daoen/Cii55CzbTV6DU=
|
|
||||||
github.com/eapache/queue v1.1.0/go.mod h1:6eCeP0CKFpHLu8blIFXhExK/dRa7WDZfr6jVFPTqq+I=
|
|
||||||
github.com/elazarl/goproxy v0.0.0-20180725130230-947c36da3153/go.mod h1:/Zj4wYkgs4iZTTu3o/KG3Itv/qCCa8VVMlb3i9OVuzc=
|
|
||||||
github.com/emicklei/go-restful v0.0.0-20170410110728-ff4f55a20633/go.mod h1:otzb+WCGbkyDHkqmQmT5YD2WR4BBwUdeQoFo8l/7tVs=
|
|
||||||
github.com/envoyproxy/go-control-plane v0.6.9/go.mod h1:SBwIajubJHhxtWwsL9s8ss4safvEdbitLhGGK48rN6g=
|
|
||||||
github.com/envoyproxy/go-control-plane v0.9.0/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4=
|
github.com/envoyproxy/go-control-plane v0.9.0/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4=
|
||||||
github.com/envoyproxy/go-control-plane v0.9.1-0.20191026205805-5f8ba28d4473/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4=
|
github.com/envoyproxy/go-control-plane v0.9.1-0.20191026205805-5f8ba28d4473/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4=
|
||||||
github.com/envoyproxy/go-control-plane v0.9.4/go.mod h1:6rpuAdCZL397s3pYoYcLgu1mIlRU8Am5FuJP05cCM98=
|
github.com/envoyproxy/go-control-plane v0.9.4/go.mod h1:6rpuAdCZL397s3pYoYcLgu1mIlRU8Am5FuJP05cCM98=
|
||||||
|
@ -186,7 +145,6 @@ github.com/envoyproxy/go-control-plane v0.9.9-0.20210512163311-63b5d3c536b0/go.m
|
||||||
github.com/envoyproxy/go-control-plane v0.9.10-0.20210907150352-cf90f659a021/go.mod h1:AFq3mo9L8Lqqiid3OhADV3RfLJnjiw63cSpi+fDTRC0=
|
github.com/envoyproxy/go-control-plane v0.9.10-0.20210907150352-cf90f659a021/go.mod h1:AFq3mo9L8Lqqiid3OhADV3RfLJnjiw63cSpi+fDTRC0=
|
||||||
github.com/envoyproxy/go-control-plane v0.10.2-0.20220325020618-49ff273808a1/go.mod h1:KJwIaB5Mv44NWtYuAOFCVOjcI94vtpEz2JU/D2v6IjE=
|
github.com/envoyproxy/go-control-plane v0.10.2-0.20220325020618-49ff273808a1/go.mod h1:KJwIaB5Mv44NWtYuAOFCVOjcI94vtpEz2JU/D2v6IjE=
|
||||||
github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c=
|
github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c=
|
||||||
github.com/evanphx/json-patch v4.12.0+incompatible/go.mod h1:50XU6AFN0ol/bzJsmQLiYLvXMP4fmwYFNcr97nuDLSk=
|
|
||||||
github.com/facebookgo/ensure v0.0.0-20160127193407-b4ab57deab51 h1:0JZ+dUmQeA8IIVUMzysrX4/AKuQwWhV2dYQuPZdvdSQ=
|
github.com/facebookgo/ensure v0.0.0-20160127193407-b4ab57deab51 h1:0JZ+dUmQeA8IIVUMzysrX4/AKuQwWhV2dYQuPZdvdSQ=
|
||||||
github.com/facebookgo/ensure v0.0.0-20160127193407-b4ab57deab51/go.mod h1:Yg+htXGokKKdzcwhuNDwVvN+uBxDGXJ7G/VN1d8fa64=
|
github.com/facebookgo/ensure v0.0.0-20160127193407-b4ab57deab51/go.mod h1:Yg+htXGokKKdzcwhuNDwVvN+uBxDGXJ7G/VN1d8fa64=
|
||||||
github.com/facebookgo/freeport v0.0.0-20150612182905-d4adf43b75b9 h1:wWke/RUCl7VRjQhwPlR/v0glZXNYzBHdNUzf/Am2Nmg=
|
github.com/facebookgo/freeport v0.0.0-20150612182905-d4adf43b75b9 h1:wWke/RUCl7VRjQhwPlR/v0glZXNYzBHdNUzf/Am2Nmg=
|
||||||
|
@ -197,68 +155,73 @@ github.com/facebookgo/stack v0.0.0-20160209184415-751773369052 h1:JWuenKqqX8nojt
|
||||||
github.com/facebookgo/stack v0.0.0-20160209184415-751773369052/go.mod h1:UbMTZqLaRiH3MsBH8va0n7s1pQYcu3uTb8G4tygF4Zg=
|
github.com/facebookgo/stack v0.0.0-20160209184415-751773369052/go.mod h1:UbMTZqLaRiH3MsBH8va0n7s1pQYcu3uTb8G4tygF4Zg=
|
||||||
github.com/facebookgo/subset v0.0.0-20150612182917-8dac2c3c4870 h1:E2s37DuLxFhQDg5gKsWoLBOB0n+ZW8s599zru8FJ2/Y=
|
github.com/facebookgo/subset v0.0.0-20150612182917-8dac2c3c4870 h1:E2s37DuLxFhQDg5gKsWoLBOB0n+ZW8s599zru8FJ2/Y=
|
||||||
github.com/facebookgo/subset v0.0.0-20150612182917-8dac2c3c4870/go.mod h1:5tD+neXqOorC30/tWg0LCSkrqj/AR6gu8yY8/fpw1q0=
|
github.com/facebookgo/subset v0.0.0-20150612182917-8dac2c3c4870/go.mod h1:5tD+neXqOorC30/tWg0LCSkrqj/AR6gu8yY8/fpw1q0=
|
||||||
github.com/farsightsec/golang-framestream v0.3.0/go.mod h1:eNde4IQyEiA5br02AouhEHCu3p3UzrCdFR4LuQHklMI=
|
|
||||||
github.com/flynn/go-shlex v0.0.0-20150515145356-3f9db97f8568 h1:BHsljHzVlRcyQhjrss6TZTdY2VfCqZPbv5k3iBFa2ZQ=
|
github.com/flynn/go-shlex v0.0.0-20150515145356-3f9db97f8568 h1:BHsljHzVlRcyQhjrss6TZTdY2VfCqZPbv5k3iBFa2ZQ=
|
||||||
github.com/flynn/go-shlex v0.0.0-20150515145356-3f9db97f8568/go.mod h1:xEzjJPgXI435gkrCt3MPfRiAkVrwSbHsst4LCFVfpJc=
|
github.com/flynn/go-shlex v0.0.0-20150515145356-3f9db97f8568/go.mod h1:xEzjJPgXI435gkrCt3MPfRiAkVrwSbHsst4LCFVfpJc=
|
||||||
github.com/form3tech-oss/jwt-go v3.2.2+incompatible/go.mod h1:pbq4aXjuKjdthFRnoDwaVPLA+WlJuPGy+QneDUgJi2k=
|
|
||||||
github.com/form3tech-oss/jwt-go v3.2.3+incompatible/go.mod h1:pbq4aXjuKjdthFRnoDwaVPLA+WlJuPGy+QneDUgJi2k=
|
|
||||||
github.com/fortytw2/leaktest v1.3.0/go.mod h1:jDsjWgpAGjm2CA7WthBh/CdZYEPF31XHquHwclZch5g=
|
|
||||||
github.com/francoispqt/gojay v1.2.13/go.mod h1:ehT5mTG4ua4581f1++1WLG0vPdaA9HaiDsoyrBGkyDY=
|
github.com/francoispqt/gojay v1.2.13/go.mod h1:ehT5mTG4ua4581f1++1WLG0vPdaA9HaiDsoyrBGkyDY=
|
||||||
github.com/frankban/quicktest v1.11.3/go.mod h1:wRf/ReqHper53s+kmmSZizM8NamnL3IM0I9ntUbOk+k=
|
|
||||||
github.com/fsnotify/fsnotify v1.4.7/go.mod h1:jwhsz4b93w/PPRr/qN1Yymfu8t87LnFCMoQvtojpjFo=
|
github.com/fsnotify/fsnotify v1.4.7/go.mod h1:jwhsz4b93w/PPRr/qN1Yymfu8t87LnFCMoQvtojpjFo=
|
||||||
github.com/fsnotify/fsnotify v1.4.9 h1:hsms1Qyu0jgnwNXIxa+/V/PDsU6CfLf6CNO8H7IWoS4=
|
github.com/fsnotify/fsnotify v1.4.9 h1:hsms1Qyu0jgnwNXIxa+/V/PDsU6CfLf6CNO8H7IWoS4=
|
||||||
github.com/fsnotify/fsnotify v1.4.9/go.mod h1:znqG4EE+3YCdAaPaxE2ZRY/06pZUdp0tY4IgpuI1SZQ=
|
github.com/fsnotify/fsnotify v1.4.9/go.mod h1:znqG4EE+3YCdAaPaxE2ZRY/06pZUdp0tY4IgpuI1SZQ=
|
||||||
github.com/getkin/kin-openapi v0.76.0/go.mod h1:660oXbgy5JFMKreazJaQTw7o+X00qeSyhcnluiMv+Xg=
|
github.com/getsentry/raven-go v0.2.0 h1:no+xWJRb5ZI7eE8TWgIq1jLulQiIoLG0IfYxv5JYMGs=
|
||||||
github.com/getsentry/raven-go v0.0.0-20180517221441-ed7bcb39ff10 h1:YO10pIIBftO/kkTFdWhctH96grJ7qiy7bMdiZcIvPKs=
|
github.com/getsentry/raven-go v0.2.0/go.mod h1:KungGk8q33+aIAZUIVWZDr2OfAEBsO49PX4NzFV5kcQ=
|
||||||
github.com/getsentry/raven-go v0.0.0-20180517221441-ed7bcb39ff10/go.mod h1:KungGk8q33+aIAZUIVWZDr2OfAEBsO49PX4NzFV5kcQ=
|
github.com/getsentry/sentry-go v0.16.0 h1:owk+S+5XcgJLlGR/3+3s6N4d+uKwqYvh/eS0AIMjPWo=
|
||||||
|
github.com/getsentry/sentry-go v0.16.0/go.mod h1:ZXCloQLj0pG7mja5NK6NPf2V4A88YJ4pNlc2mOHwh6Y=
|
||||||
github.com/ghodss/yaml v1.0.0/go.mod h1:4dBDuWmgqj2HViK6kFavaiC9ZROes6MMH2rRYeMEF04=
|
github.com/ghodss/yaml v1.0.0/go.mod h1:4dBDuWmgqj2HViK6kFavaiC9ZROes6MMH2rRYeMEF04=
|
||||||
|
github.com/gin-contrib/sse v0.1.0 h1:Y/yl/+YNO8GZSjAhjMsSuLt29uWRFHdHYUb5lYOV9qE=
|
||||||
|
github.com/gin-contrib/sse v0.1.0/go.mod h1:RHrZQHXnP2xjPF+u1gW/2HnVO7nvIa9PG3Gm+fLHvGI=
|
||||||
|
github.com/gin-gonic/gin v1.6.3/go.mod h1:75u5sXoLsGZoRN5Sgbi1eraJ4GU3++wFwWzhwvtwp4M=
|
||||||
|
github.com/gin-gonic/gin v1.8.1 h1:4+fr/el88TOO3ewCmQr8cx/CtZ/umlIRIs5M4NTNjf8=
|
||||||
github.com/gliderlabs/ssh v0.1.1/go.mod h1:U7qILu1NlMHj9FlMhZLlkCdDnU1DBEAqr0aevW3Awn0=
|
github.com/gliderlabs/ssh v0.1.1/go.mod h1:U7qILu1NlMHj9FlMhZLlkCdDnU1DBEAqr0aevW3Awn0=
|
||||||
|
github.com/go-chi/chi/v5 v5.0.8 h1:lD+NLqFcAi1ovnVZpsnObHGW4xb4J8lNmoYVfECH1Y0=
|
||||||
|
github.com/go-chi/chi/v5 v5.0.8/go.mod h1:DslCQbL2OYiznFReuXYUmQ2hGd1aDpCnlMNITLSKoi8=
|
||||||
github.com/go-errors/errors v1.0.1/go.mod h1:f4zRHt4oKfwPJE5k8C9vpYG+aDHdBFUsgrm6/TyX73Q=
|
github.com/go-errors/errors v1.0.1/go.mod h1:f4zRHt4oKfwPJE5k8C9vpYG+aDHdBFUsgrm6/TyX73Q=
|
||||||
|
github.com/go-errors/errors v1.4.2 h1:J6MZopCL4uSllY1OfXM374weqZFFItUbrImctkmUxIA=
|
||||||
github.com/go-gl/glfw v0.0.0-20190409004039-e6da0acd62b1/go.mod h1:vR7hzQXu2zJy9AVAgeJqvqgH9Q5CA+iKCZ2gyEVpxRU=
|
github.com/go-gl/glfw v0.0.0-20190409004039-e6da0acd62b1/go.mod h1:vR7hzQXu2zJy9AVAgeJqvqgH9Q5CA+iKCZ2gyEVpxRU=
|
||||||
github.com/go-gl/glfw/v3.3/glfw v0.0.0-20191125211704-12ad95a8df72/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8=
|
github.com/go-gl/glfw/v3.3/glfw v0.0.0-20191125211704-12ad95a8df72/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8=
|
||||||
github.com/go-gl/glfw/v3.3/glfw v0.0.0-20200222043503-6f7a984d4dc4/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8=
|
github.com/go-gl/glfw/v3.3/glfw v0.0.0-20200222043503-6f7a984d4dc4/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8=
|
||||||
|
github.com/go-jose/go-jose/v3 v3.0.0 h1:s6rrhirfEP/CGIoc6p+PZAeogN2SxKav6Wp7+dyMWVo=
|
||||||
|
github.com/go-jose/go-jose/v3 v3.0.0/go.mod h1:RNkWWRld676jZEYoV3+XK8L2ZnNSvIsxFMht0mSX+u8=
|
||||||
github.com/go-kit/kit v0.8.0/go.mod h1:xBxKIO96dXMWWy0MnWVtmwkA9/13aqxPnvrjFYMA2as=
|
github.com/go-kit/kit v0.8.0/go.mod h1:xBxKIO96dXMWWy0MnWVtmwkA9/13aqxPnvrjFYMA2as=
|
||||||
github.com/go-kit/kit v0.9.0/go.mod h1:xBxKIO96dXMWWy0MnWVtmwkA9/13aqxPnvrjFYMA2as=
|
github.com/go-kit/kit v0.9.0/go.mod h1:xBxKIO96dXMWWy0MnWVtmwkA9/13aqxPnvrjFYMA2as=
|
||||||
github.com/go-kit/log v0.1.0/go.mod h1:zbhenjAZHb184qTLMA9ZjW7ThYL0H2mk7Q6pNt4vbaY=
|
github.com/go-kit/log v0.1.0/go.mod h1:zbhenjAZHb184qTLMA9ZjW7ThYL0H2mk7Q6pNt4vbaY=
|
||||||
|
github.com/go-kit/log v0.2.0/go.mod h1:NwTd00d/i8cPZ3xOwwiv2PO5MOcx78fFErGNcVmBjv0=
|
||||||
github.com/go-logfmt/logfmt v0.3.0/go.mod h1:Qt1PoO58o5twSAckw1HlFXLmHsOX5/0LbT9GBnD5lWE=
|
github.com/go-logfmt/logfmt v0.3.0/go.mod h1:Qt1PoO58o5twSAckw1HlFXLmHsOX5/0LbT9GBnD5lWE=
|
||||||
github.com/go-logfmt/logfmt v0.4.0/go.mod h1:3RMwSq7FuexP4Kalkev3ejPJsZTpXXBr9+V4qmtdjCk=
|
github.com/go-logfmt/logfmt v0.4.0/go.mod h1:3RMwSq7FuexP4Kalkev3ejPJsZTpXXBr9+V4qmtdjCk=
|
||||||
github.com/go-logfmt/logfmt v0.5.0/go.mod h1:wCYkCAKZfumFQihp8CzCvQ3paCTfi41vtzG1KdI/P7A=
|
github.com/go-logfmt/logfmt v0.5.0/go.mod h1:wCYkCAKZfumFQihp8CzCvQ3paCTfi41vtzG1KdI/P7A=
|
||||||
github.com/go-logr/logr v0.1.0/go.mod h1:ixOQHD9gLJUVQQ2ZOR7zLEifBX6tGkNJF4QyIY7sIas=
|
github.com/go-logfmt/logfmt v0.5.1/go.mod h1:WYhtIu8zTZfxdn5+rREduYbwxfcBr/Vr6KEVveWlfTs=
|
||||||
github.com/go-logr/logr v0.2.0/go.mod h1:z6/tIYblkpsD+a4lm/fGIIU9mZ+XfAiaFtq7xTgseGU=
|
|
||||||
github.com/go-logr/logr v1.2.0/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
|
|
||||||
github.com/go-logr/logr v1.2.2/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
|
github.com/go-logr/logr v1.2.2/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
|
||||||
github.com/go-logr/logr v1.2.3 h1:2DntVwHkVopvECVRSlL5PSo9eG+cAkDCuckLubN+rq0=
|
github.com/go-logr/logr v1.2.3 h1:2DntVwHkVopvECVRSlL5PSo9eG+cAkDCuckLubN+rq0=
|
||||||
github.com/go-logr/logr v1.2.3/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
|
github.com/go-logr/logr v1.2.3/go.mod h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
|
||||||
github.com/go-logr/stdr v1.2.2 h1:hSWxHoqTgW2S2qGc0LTAI563KZ5YKYRhT3MFKZMbjag=
|
github.com/go-logr/stdr v1.2.2 h1:hSWxHoqTgW2S2qGc0LTAI563KZ5YKYRhT3MFKZMbjag=
|
||||||
github.com/go-logr/stdr v1.2.2/go.mod h1:mMo/vtBO5dYbehREoey6XUKy/eSumjCCveDpRre4VKE=
|
github.com/go-logr/stdr v1.2.2/go.mod h1:mMo/vtBO5dYbehREoey6XUKy/eSumjCCveDpRre4VKE=
|
||||||
github.com/go-openapi/jsonpointer v0.19.3/go.mod h1:Pl9vOtqEWErmShwVjC8pYs9cog34VGT37dQOVbmoatg=
|
github.com/go-playground/assert/v2 v2.0.1/go.mod h1:VDjEfimB/XKnb+ZQfWdccd7VUvScMdVu0Titje2rxJ4=
|
||||||
github.com/go-openapi/jsonpointer v0.19.5/go.mod h1:Pl9vOtqEWErmShwVjC8pYs9cog34VGT37dQOVbmoatg=
|
github.com/go-playground/locales v0.13.0/go.mod h1:taPMhCMXrRLJO55olJkUXHZBHCxTMfnGwq/HNwmWNS8=
|
||||||
github.com/go-openapi/jsonreference v0.19.3/go.mod h1:rjx6GuL8TTa9VaixXglHmQmIL98+wF9xc8zWvFonSJ8=
|
github.com/go-playground/locales v0.14.0 h1:u50s323jtVGugKlcYeyzC0etD1HifMjqmJqb8WugfUU=
|
||||||
github.com/go-openapi/swag v0.19.5/go.mod h1:POnQmlKehdgb5mhVOsnJFsivZCEZ/vjK9gh66Z9tfKk=
|
github.com/go-playground/universal-translator v0.17.0/go.mod h1:UkSxE5sNxxRwHyU+Scu5vgOQjsIJAF8j9muTVoKLVtA=
|
||||||
|
github.com/go-playground/universal-translator v0.18.0 h1:82dyy6p4OuJq4/CByFNOn/jYrnRPArHwAcmLoJZxyho=
|
||||||
|
github.com/go-playground/validator/v10 v10.2.0/go.mod h1:uOYAAleCW8F/7oMFd6aG0GOhaH6EGOAJShg8Id5JGkI=
|
||||||
|
github.com/go-playground/validator/v10 v10.11.1 h1:prmOlTVv+YjZjmRmNSF3VmspqJIxJWXmqUsHwfTRRkQ=
|
||||||
github.com/go-stack/stack v1.8.0/go.mod h1:v0f6uXyyMGvRgIKkXu+yp6POWl0qKG85gN/melR3HDY=
|
github.com/go-stack/stack v1.8.0/go.mod h1:v0f6uXyyMGvRgIKkXu+yp6POWl0qKG85gN/melR3HDY=
|
||||||
github.com/go-task/slim-sprig v0.0.0-20210107165309-348f09dbbbc0 h1:p104kn46Q8WdvHunIJ9dAyjPVtrBPhSr3KT2yUst43I=
|
github.com/go-task/slim-sprig v0.0.0-20210107165309-348f09dbbbc0 h1:p104kn46Q8WdvHunIJ9dAyjPVtrBPhSr3KT2yUst43I=
|
||||||
github.com/go-task/slim-sprig v0.0.0-20210107165309-348f09dbbbc0/go.mod h1:fyg7847qk6SyHyPtNmDHnmrv/HOrqktSC+C9fM+CJOE=
|
github.com/go-task/slim-sprig v0.0.0-20210107165309-348f09dbbbc0/go.mod h1:fyg7847qk6SyHyPtNmDHnmrv/HOrqktSC+C9fM+CJOE=
|
||||||
|
github.com/gobwas/httphead v0.0.0-20180130184737-2c6c146eadee/go.mod h1:L0fX3K22YWvt/FAX9NnzrNzcI4wNYi9Yku4O0LKYflo=
|
||||||
github.com/gobwas/httphead v0.0.0-20200921212729-da3d93bc3c58 h1:YyrUZvJaU8Q0QsoVo+xLFBgWDTam29PKea6GYmwvSiQ=
|
github.com/gobwas/httphead v0.0.0-20200921212729-da3d93bc3c58 h1:YyrUZvJaU8Q0QsoVo+xLFBgWDTam29PKea6GYmwvSiQ=
|
||||||
github.com/gobwas/httphead v0.0.0-20200921212729-da3d93bc3c58/go.mod h1:L0fX3K22YWvt/FAX9NnzrNzcI4wNYi9Yku4O0LKYflo=
|
github.com/gobwas/httphead v0.0.0-20200921212729-da3d93bc3c58/go.mod h1:L0fX3K22YWvt/FAX9NnzrNzcI4wNYi9Yku4O0LKYflo=
|
||||||
|
github.com/gobwas/pool v0.2.0/go.mod h1:q8bcK0KcYlCgd9e7WYLm9LpyS+YeLd8JVDW6WezmKEw=
|
||||||
github.com/gobwas/pool v0.2.1 h1:xfeeEhW7pwmX8nuLVlqbzVc7udMDrwetjEv+TZIz1og=
|
github.com/gobwas/pool v0.2.1 h1:xfeeEhW7pwmX8nuLVlqbzVc7udMDrwetjEv+TZIz1og=
|
||||||
github.com/gobwas/pool v0.2.1/go.mod h1:q8bcK0KcYlCgd9e7WYLm9LpyS+YeLd8JVDW6WezmKEw=
|
github.com/gobwas/pool v0.2.1/go.mod h1:q8bcK0KcYlCgd9e7WYLm9LpyS+YeLd8JVDW6WezmKEw=
|
||||||
|
github.com/gobwas/ws v1.0.2/go.mod h1:szmBTxLgaFppYjEmNtny/v3w89xOydFnnZMcgRRu/EM=
|
||||||
github.com/gobwas/ws v1.0.4 h1:5eXU1CZhpQdq5kXbKb+sECH5Ia5KiO6CYzIzdlVx6Bs=
|
github.com/gobwas/ws v1.0.4 h1:5eXU1CZhpQdq5kXbKb+sECH5Ia5KiO6CYzIzdlVx6Bs=
|
||||||
github.com/gobwas/ws v1.0.4/go.mod h1:szmBTxLgaFppYjEmNtny/v3w89xOydFnnZMcgRRu/EM=
|
github.com/gobwas/ws v1.0.4/go.mod h1:szmBTxLgaFppYjEmNtny/v3w89xOydFnnZMcgRRu/EM=
|
||||||
github.com/godbus/dbus/v5 v5.0.4/go.mod h1:xhWf0FNVPg57R7Z0UbKHbJfkEywrmjJnf7w5xrFpKfA=
|
github.com/goccy/go-json v0.9.11 h1:/pAaQDLHEoCq/5FFmSKBswWmK6H0e8g4159Kc/X/nqk=
|
||||||
github.com/gogo/googleapis v1.1.0/go.mod h1:gf4bu3Q80BeJ6H1S1vYPm8/ELATdvryBaNFGgqEef3s=
|
|
||||||
github.com/gogo/protobuf v1.1.1/go.mod h1:r8qH/GZQm5c6nD/R0oafs1akxWv10x8SbQlK7atdtwQ=
|
github.com/gogo/protobuf v1.1.1/go.mod h1:r8qH/GZQm5c6nD/R0oafs1akxWv10x8SbQlK7atdtwQ=
|
||||||
github.com/gogo/protobuf v1.2.0/go.mod h1:r8qH/GZQm5c6nD/R0oafs1akxWv10x8SbQlK7atdtwQ=
|
|
||||||
github.com/gogo/protobuf v1.3.2/go.mod h1:P1XiOD3dCwIKUDQYPy72D8LYyHL2YPYrpS2s69NZV8Q=
|
|
||||||
github.com/golang-collections/collections v0.0.0-20130729185459-604e922904d3 h1:zN2lZNZRflqFyxVaTIU61KNKQ9C0055u9CAfpmqUvo4=
|
github.com/golang-collections/collections v0.0.0-20130729185459-604e922904d3 h1:zN2lZNZRflqFyxVaTIU61KNKQ9C0055u9CAfpmqUvo4=
|
||||||
github.com/golang-collections/collections v0.0.0-20130729185459-604e922904d3/go.mod h1:nPpo7qLxd6XL3hWJG/O60sR8ZKfMCiIoNap5GvD12KU=
|
github.com/golang-collections/collections v0.0.0-20130729185459-604e922904d3/go.mod h1:nPpo7qLxd6XL3hWJG/O60sR8ZKfMCiIoNap5GvD12KU=
|
||||||
github.com/golang-jwt/jwt/v4 v4.0.0/go.mod h1:/xlHOz8bRuivTWchD4jCa+NbatV+wEUSzwAxVc6locg=
|
|
||||||
github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b/go.mod h1:SBH7ygxi8pfUlaOkMMuAQtPIUF8ecWP5IEl/CR7VP2Q=
|
github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b/go.mod h1:SBH7ygxi8pfUlaOkMMuAQtPIUF8ecWP5IEl/CR7VP2Q=
|
||||||
github.com/golang/glog v1.0.0 h1:nfP3RFugxnNRyKgeWd4oI1nYvXpxrx8ck8ZrcizshdQ=
|
github.com/golang/glog v1.0.0 h1:nfP3RFugxnNRyKgeWd4oI1nYvXpxrx8ck8ZrcizshdQ=
|
||||||
github.com/golang/glog v1.0.0/go.mod h1:EWib/APOK0SL3dFbYqvxE3UYd8E6s1ouQ7iEp/0LWV4=
|
github.com/golang/glog v1.0.0/go.mod h1:EWib/APOK0SL3dFbYqvxE3UYd8E6s1ouQ7iEp/0LWV4=
|
||||||
github.com/golang/groupcache v0.0.0-20190702054246-869f871628b6/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
|
github.com/golang/groupcache v0.0.0-20190702054246-869f871628b6/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
|
||||||
github.com/golang/groupcache v0.0.0-20191227052852-215e87163ea7/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
|
github.com/golang/groupcache v0.0.0-20191227052852-215e87163ea7/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
|
||||||
github.com/golang/groupcache v0.0.0-20200121045136-8c9f03a8e57e/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
|
github.com/golang/groupcache v0.0.0-20200121045136-8c9f03a8e57e/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
|
||||||
github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
|
|
||||||
github.com/golang/lint v0.0.0-20180702182130-06c8688daad7/go.mod h1:tluoj9z5200jBnyusfRPU2LqT6J+DAorxEvtC7LHB+E=
|
github.com/golang/lint v0.0.0-20180702182130-06c8688daad7/go.mod h1:tluoj9z5200jBnyusfRPU2LqT6J+DAorxEvtC7LHB+E=
|
||||||
github.com/golang/mock v1.1.1/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A=
|
github.com/golang/mock v1.1.1/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A=
|
||||||
github.com/golang/mock v1.2.0/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A=
|
github.com/golang/mock v1.2.0/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A=
|
||||||
|
@ -288,12 +251,9 @@ github.com/golang/protobuf v1.5.0/go.mod h1:FsONVRAS9T7sI+LIUmWTfcYkHO4aIWwzhcaS
|
||||||
github.com/golang/protobuf v1.5.1/go.mod h1:DopwsBzvsk0Fs44TXzsVbJyPhcCPeIwnvohx4u74HPM=
|
github.com/golang/protobuf v1.5.1/go.mod h1:DopwsBzvsk0Fs44TXzsVbJyPhcCPeIwnvohx4u74HPM=
|
||||||
github.com/golang/protobuf v1.5.2 h1:ROPKBNFfQgOUMifHyP+KYbvpjbdoFNs+aK7DXlji0Tw=
|
github.com/golang/protobuf v1.5.2 h1:ROPKBNFfQgOUMifHyP+KYbvpjbdoFNs+aK7DXlji0Tw=
|
||||||
github.com/golang/protobuf v1.5.2/go.mod h1:XVQd3VNwM+JqD3oG2Ue2ip4fOMUkwXdXDdiuN0vRsmY=
|
github.com/golang/protobuf v1.5.2/go.mod h1:XVQd3VNwM+JqD3oG2Ue2ip4fOMUkwXdXDdiuN0vRsmY=
|
||||||
github.com/golang/snappy v0.0.0-20180518054509-2e65f85255db/go.mod h1:/XxbfmMg8lxefKM7IXC3fBNl/7bRcc72aCRzEWrmP2Q=
|
|
||||||
github.com/golang/snappy v0.0.3/go.mod h1:/XxbfmMg8lxefKM7IXC3fBNl/7bRcc72aCRzEWrmP2Q=
|
github.com/golang/snappy v0.0.3/go.mod h1:/XxbfmMg8lxefKM7IXC3fBNl/7bRcc72aCRzEWrmP2Q=
|
||||||
github.com/golang/snappy v0.0.4/go.mod h1:/XxbfmMg8lxefKM7IXC3fBNl/7bRcc72aCRzEWrmP2Q=
|
|
||||||
github.com/google/btree v0.0.0-20180813153112-4030bb1f1f0c/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ=
|
github.com/google/btree v0.0.0-20180813153112-4030bb1f1f0c/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ=
|
||||||
github.com/google/btree v1.0.0/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ=
|
github.com/google/btree v1.0.0/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ=
|
||||||
github.com/google/btree v1.0.1/go.mod h1:xXMiIv4Fb/0kKde4SpL7qlzvu5cMJDRkFDxJfI9uaxA=
|
|
||||||
github.com/google/go-cmp v0.2.0/go.mod h1:oXzfMopK8JAjlY9xF4vHSVASa0yLyX7SntLO5aqRK0M=
|
github.com/google/go-cmp v0.2.0/go.mod h1:oXzfMopK8JAjlY9xF4vHSVASa0yLyX7SntLO5aqRK0M=
|
||||||
github.com/google/go-cmp v0.3.0/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
|
github.com/google/go-cmp v0.3.0/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
|
||||||
github.com/google/go-cmp v0.3.1/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
|
github.com/google/go-cmp v0.3.1/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU=
|
||||||
|
@ -307,13 +267,11 @@ github.com/google/go-cmp v0.5.4/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/
|
||||||
github.com/google/go-cmp v0.5.5/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
|
github.com/google/go-cmp v0.5.5/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
|
||||||
github.com/google/go-cmp v0.5.6/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
|
github.com/google/go-cmp v0.5.6/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
|
||||||
github.com/google/go-cmp v0.5.7/go.mod h1:n+brtR0CgQNWTVd5ZUFpTBC8YFBDLK/h/bpaJ8/DtOE=
|
github.com/google/go-cmp v0.5.7/go.mod h1:n+brtR0CgQNWTVd5ZUFpTBC8YFBDLK/h/bpaJ8/DtOE=
|
||||||
github.com/google/go-cmp v0.5.8 h1:e6P7q2lk1O+qJJb4BtCQXlK8vWEO8V1ZeuEdJNOqZyg=
|
|
||||||
github.com/google/go-cmp v0.5.8/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
|
github.com/google/go-cmp v0.5.8/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
|
||||||
|
github.com/google/go-cmp v0.5.9 h1:O2Tfq5qg4qc4AmwVlvv0oLiVAGB7enBSJ2x2DqQFi38=
|
||||||
github.com/google/go-github v17.0.0+incompatible/go.mod h1:zLgOLi98H3fifZn+44m+umXrS52loVEgC2AApnigrVQ=
|
github.com/google/go-github v17.0.0+incompatible/go.mod h1:zLgOLi98H3fifZn+44m+umXrS52loVEgC2AApnigrVQ=
|
||||||
github.com/google/go-querystring v1.0.0/go.mod h1:odCYkC5MyYFN7vkCjXpyrEuKhc/BUO6wN/zVPAxq5ck=
|
github.com/google/go-querystring v1.0.0/go.mod h1:odCYkC5MyYFN7vkCjXpyrEuKhc/BUO6wN/zVPAxq5ck=
|
||||||
github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
|
github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
|
||||||
github.com/google/gofuzz v1.1.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
|
|
||||||
github.com/google/gofuzz v1.2.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg=
|
|
||||||
github.com/google/gopacket v1.1.19 h1:ves8RnFZPGiFnTS0uPQStjwru6uO6h+nlr9j6fL7kF8=
|
github.com/google/gopacket v1.1.19 h1:ves8RnFZPGiFnTS0uPQStjwru6uO6h+nlr9j6fL7kF8=
|
||||||
github.com/google/gopacket v1.1.19/go.mod h1:iJ8V8n6KS+z2U1A8pUwu8bW5SyEMkXJB8Yo/Vo+TKTo=
|
github.com/google/gopacket v1.1.19/go.mod h1:iJ8V8n6KS+z2U1A8pUwu8bW5SyEMkXJB8Yo/Vo+TKTo=
|
||||||
github.com/google/martian v2.1.0+incompatible/go.mod h1:9I4somxYTbIHy5NJKHRl3wXiIaQGbYVAs8BPL6v8lEs=
|
github.com/google/martian v2.1.0+incompatible/go.mod h1:9I4somxYTbIHy5NJKHRl3wXiIaQGbYVAs8BPL6v8lEs=
|
||||||
|
@ -331,7 +289,6 @@ github.com/google/pprof v0.0.0-20201023163331-3e6fc7fc9c4c/go.mod h1:kpwsk12EmLe
|
||||||
github.com/google/pprof v0.0.0-20201203190320-1bf35d6f28c2/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
|
github.com/google/pprof v0.0.0-20201203190320-1bf35d6f28c2/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
|
||||||
github.com/google/pprof v0.0.0-20210122040257-d980be63207e/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
|
github.com/google/pprof v0.0.0-20210122040257-d980be63207e/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
|
||||||
github.com/google/pprof v0.0.0-20210226084205-cbba55b83ad5/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
|
github.com/google/pprof v0.0.0-20210226084205-cbba55b83ad5/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
|
||||||
github.com/google/pprof v0.0.0-20210423192551-a2663126120b/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
|
|
||||||
github.com/google/pprof v0.0.0-20210601050228-01bbb1931b22/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
|
github.com/google/pprof v0.0.0-20210601050228-01bbb1931b22/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
|
||||||
github.com/google/pprof v0.0.0-20210609004039-a478d1d731e9/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
|
github.com/google/pprof v0.0.0-20210609004039-a478d1d731e9/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
|
||||||
github.com/google/pprof v0.0.0-20210720184732-4bb14d4b1be1/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
|
github.com/google/pprof v0.0.0-20210720184732-4bb14d4b1be1/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
|
||||||
|
@ -350,49 +307,29 @@ github.com/googleapis/gax-go/v2 v2.1.1/go.mod h1:hddJymUZASv3XPyGkUpKj8pPO47Rmb0
|
||||||
github.com/googleapis/gax-go/v2 v2.2.0/go.mod h1:as02EH8zWkzwUoLbBaFeQ+arQaj/OthfcblKl4IGNaM=
|
github.com/googleapis/gax-go/v2 v2.2.0/go.mod h1:as02EH8zWkzwUoLbBaFeQ+arQaj/OthfcblKl4IGNaM=
|
||||||
github.com/googleapis/gax-go/v2 v2.3.0/go.mod h1:b8LNqSzNabLiUpXKkY7HAR5jr6bIT99EXz9pXxye9YM=
|
github.com/googleapis/gax-go/v2 v2.3.0/go.mod h1:b8LNqSzNabLiUpXKkY7HAR5jr6bIT99EXz9pXxye9YM=
|
||||||
github.com/googleapis/gax-go/v2 v2.4.0/go.mod h1:XOTVJ59hdnfJLIP/dh8n5CGryZR2LxK9wbMD5+iXC6c=
|
github.com/googleapis/gax-go/v2 v2.4.0/go.mod h1:XOTVJ59hdnfJLIP/dh8n5CGryZR2LxK9wbMD5+iXC6c=
|
||||||
github.com/googleapis/gnostic v0.5.1/go.mod h1:6U4PtQXGIEt/Z3h5MAT7FNofLnw9vXk2cUuW7uA/OeU=
|
|
||||||
github.com/googleapis/gnostic v0.5.5/go.mod h1:7+EbHbldMins07ALC74bsA81Ovc97DwqyJO1AENw9kA=
|
|
||||||
github.com/googleapis/go-type-adapters v1.0.0/go.mod h1:zHW75FOG2aur7gAO2B+MLby+cLsWGBF62rFAi7WjWO4=
|
github.com/googleapis/go-type-adapters v1.0.0/go.mod h1:zHW75FOG2aur7gAO2B+MLby+cLsWGBF62rFAi7WjWO4=
|
||||||
github.com/gopherjs/gopherjs v0.0.0-20181017120253-0766667cb4d1/go.mod h1:wJfORRmW1u3UXTncJ5qlYoELFm8eSnnEO6hX4iZ3EWY=
|
github.com/gopherjs/gopherjs v0.0.0-20181017120253-0766667cb4d1/go.mod h1:wJfORRmW1u3UXTncJ5qlYoELFm8eSnnEO6hX4iZ3EWY=
|
||||||
github.com/gorilla/context v1.1.1/go.mod h1:kBGZzfjB9CEq2AlWe17Uuf7NDRt0dE0s8S51q0aT7Yg=
|
github.com/gorilla/websocket v1.4.1/go.mod h1:YR8l580nyteQvAITg2hZ9XVh4b55+EU/adAjf1fMHhE=
|
||||||
github.com/gorilla/mux v1.6.2/go.mod h1:1lud6UwP+6orDFRuTfBEV8e9/aOM/c4fVVCaMa2zaAs=
|
|
||||||
github.com/gorilla/mux v1.7.3/go.mod h1:1lud6UwP+6orDFRuTfBEV8e9/aOM/c4fVVCaMa2zaAs=
|
|
||||||
github.com/gorilla/mux v1.8.0 h1:i40aqfkR1h2SlN9hojwV5ZA91wcXFOvkdNIeFDP5koI=
|
|
||||||
github.com/gorilla/mux v1.8.0/go.mod h1:DVbg23sWSpFRCP0SfiEN6jmj59UnW/n46BH5rLB71So=
|
|
||||||
github.com/gorilla/securecookie v1.1.1/go.mod h1:ra0sb63/xPlUeL+yeDciTfxMRAA+MP+HVt/4epWDjd4=
|
|
||||||
github.com/gorilla/sessions v1.2.1/go.mod h1:dk2InVEVJ0sfLlnXv9EAgkf6ecYs/i80K/zI+bUmuGM=
|
|
||||||
github.com/gorilla/websocket v1.4.2 h1:+/TMaTYc4QFitKJxsQ7Yye35DkWvkdLcvGKqM+x0Ufc=
|
github.com/gorilla/websocket v1.4.2 h1:+/TMaTYc4QFitKJxsQ7Yye35DkWvkdLcvGKqM+x0Ufc=
|
||||||
github.com/gorilla/websocket v1.4.2/go.mod h1:YR8l580nyteQvAITg2hZ9XVh4b55+EU/adAjf1fMHhE=
|
github.com/gorilla/websocket v1.4.2/go.mod h1:YR8l580nyteQvAITg2hZ9XVh4b55+EU/adAjf1fMHhE=
|
||||||
github.com/gregjones/httpcache v0.0.0-20180305231024-9cad4c3443a7/go.mod h1:FecbI9+v66THATjSRHfNgh1IVFe/9kFxbXtjV0ctIMA=
|
github.com/gregjones/httpcache v0.0.0-20180305231024-9cad4c3443a7/go.mod h1:FecbI9+v66THATjSRHfNgh1IVFe/9kFxbXtjV0ctIMA=
|
||||||
github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0/go.mod h1:8NvIoxWQoOIhqOTXgfV/d3M/q6VIi02HzZEHgUlZvzk=
|
|
||||||
github.com/grpc-ecosystem/grpc-gateway v1.5.0/go.mod h1:RSKVYQBd5MCa4OVpNdGskqpgL2+G+NZTnrVHpWWfpdw=
|
github.com/grpc-ecosystem/grpc-gateway v1.5.0/go.mod h1:RSKVYQBd5MCa4OVpNdGskqpgL2+G+NZTnrVHpWWfpdw=
|
||||||
github.com/grpc-ecosystem/grpc-gateway v1.16.0/go.mod h1:BDjrQk3hbvj6Nolgz8mAMFbcEtjT1g+wF4CSlocrBnw=
|
github.com/grpc-ecosystem/grpc-gateway v1.16.0/go.mod h1:BDjrQk3hbvj6Nolgz8mAMFbcEtjT1g+wF4CSlocrBnw=
|
||||||
github.com/grpc-ecosystem/grpc-gateway/v2 v2.7.0 h1:BZHcxBETFHIdVyhyEfOvn/RdU/QGdLI4y34qQGjGWO0=
|
github.com/grpc-ecosystem/grpc-gateway/v2 v2.7.0 h1:BZHcxBETFHIdVyhyEfOvn/RdU/QGdLI4y34qQGjGWO0=
|
||||||
github.com/grpc-ecosystem/grpc-gateway/v2 v2.7.0/go.mod h1:hgWBS7lorOAVIJEQMi4ZsPv9hVvWI6+ch50m39Pf2Ks=
|
github.com/grpc-ecosystem/grpc-gateway/v2 v2.7.0/go.mod h1:hgWBS7lorOAVIJEQMi4ZsPv9hVvWI6+ch50m39Pf2Ks=
|
||||||
github.com/grpc-ecosystem/grpc-opentracing v0.0.0-20180507213350-8e809c8a8645 h1:MJG/KsmcqMwFAkh8mTnAwhyKoB+sTAnY4CACC110tbU=
|
github.com/grpc-ecosystem/grpc-opentracing v0.0.0-20180507213350-8e809c8a8645 h1:MJG/KsmcqMwFAkh8mTnAwhyKoB+sTAnY4CACC110tbU=
|
||||||
github.com/grpc-ecosystem/grpc-opentracing v0.0.0-20180507213350-8e809c8a8645/go.mod h1:6iZfnjpejD4L/4DwD7NryNaJyCQdzwWwH2MWhCA90Kw=
|
github.com/grpc-ecosystem/grpc-opentracing v0.0.0-20180507213350-8e809c8a8645/go.mod h1:6iZfnjpejD4L/4DwD7NryNaJyCQdzwWwH2MWhCA90Kw=
|
||||||
github.com/hashicorp/go-uuid v1.0.2/go.mod h1:6SBZvOh/SIDV7/2o3Jml5SYk/TvGqwFJ/bN7x4byOro=
|
|
||||||
github.com/hashicorp/golang-lru v0.5.0/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8=
|
github.com/hashicorp/golang-lru v0.5.0/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8=
|
||||||
github.com/hashicorp/golang-lru v0.5.1/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8=
|
github.com/hashicorp/golang-lru v0.5.1/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8=
|
||||||
github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU=
|
github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU=
|
||||||
github.com/ianlancetaylor/demangle v0.0.0-20181102032728-5e5cf60278f6/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc=
|
github.com/ianlancetaylor/demangle v0.0.0-20181102032728-5e5cf60278f6/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc=
|
||||||
github.com/ianlancetaylor/demangle v0.0.0-20200824232613-28f6c0f3b639/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc=
|
github.com/ianlancetaylor/demangle v0.0.0-20200824232613-28f6c0f3b639/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc=
|
||||||
github.com/imdario/mergo v0.3.5/go.mod h1:2EnlNZ0deacrJVfApfmtdGgDfMuh/nq6Ok1EcJh5FfA=
|
|
||||||
github.com/imdario/mergo v0.3.12/go.mod h1:jmQim1M+e3UYxmgPu/WyfjB3N3VflVyUjjjwH0dnCYA=
|
|
||||||
github.com/infobloxopen/go-trees v0.0.0-20200715205103-96a057b8dfb9/go.mod h1:BaIJzjD2ZnHmx2acPF6XfGLPzNCMiBbMRqJr+8/8uRI=
|
|
||||||
github.com/ipostelnik/cli/v2 v2.3.1-0.20210324024421-b6ea8234fe3d h1:PRDnysJ9dF1vUMmEzBu6aHQeUluSQy4eWH3RsSSy/vI=
|
github.com/ipostelnik/cli/v2 v2.3.1-0.20210324024421-b6ea8234fe3d h1:PRDnysJ9dF1vUMmEzBu6aHQeUluSQy4eWH3RsSSy/vI=
|
||||||
github.com/ipostelnik/cli/v2 v2.3.1-0.20210324024421-b6ea8234fe3d/go.mod h1:LJmUH05zAU44vOAcrfzZQKsZbVcdbOG8rtL3/XcUArI=
|
github.com/ipostelnik/cli/v2 v2.3.1-0.20210324024421-b6ea8234fe3d/go.mod h1:LJmUH05zAU44vOAcrfzZQKsZbVcdbOG8rtL3/XcUArI=
|
||||||
github.com/jcmturner/aescts/v2 v2.0.0/go.mod h1:AiaICIRyfYg35RUkr8yESTqvSy7csK90qZ5xfvvsoNs=
|
|
||||||
github.com/jcmturner/dnsutils/v2 v2.0.0/go.mod h1:b0TnjGOvI/n42bZa+hmXL+kFJZsFT7G4t3HTlQ184QM=
|
|
||||||
github.com/jcmturner/gofork v1.0.0/go.mod h1:MK8+TM0La+2rjBD4jE12Kj1pCCxK7d2LK/UM3ncEo0o=
|
|
||||||
github.com/jcmturner/goidentity/v6 v6.0.1/go.mod h1:X1YW3bgtvwAXju7V3LCIMpY0Gbxyjn/mY9zx4tFonSg=
|
|
||||||
github.com/jcmturner/gokrb5/v8 v8.4.2/go.mod h1:sb+Xq/fTY5yktf/VxLsE3wlfPqQjp0aWNYyvBVK62bc=
|
|
||||||
github.com/jcmturner/rpc/v2 v2.0.3/go.mod h1:VUJYCIDm3PVOEHw8sgt091/20OJjskO/YJki3ELg/Hc=
|
|
||||||
github.com/jellevandenhooff/dkim v0.0.0-20150330215556-f50fe3d243e1/go.mod h1:E0B/fFc00Y+Rasa88328GlI/XbtyysCtTHZS8h7IrBU=
|
github.com/jellevandenhooff/dkim v0.0.0-20150330215556-f50fe3d243e1/go.mod h1:E0B/fFc00Y+Rasa88328GlI/XbtyysCtTHZS8h7IrBU=
|
||||||
github.com/jmespath/go-jmespath v0.4.0/go.mod h1:T8mJZnbsbmF+m6zOOFylbeCJqk5+pHWvzYPziyZiYoo=
|
|
||||||
github.com/jmespath/go-jmespath/internal/testify v1.5.1/go.mod h1:L3OGu8Wl2/fWfCI6z80xFu9LTZmf1ZRjMHUOPmWr69U=
|
|
||||||
github.com/jpillora/backoff v1.0.0/go.mod h1:J/6gKK9jxlEcS3zixgDgUAsiuZ7yrSoa/FX5e0EB2j4=
|
github.com/jpillora/backoff v1.0.0/go.mod h1:J/6gKK9jxlEcS3zixgDgUAsiuZ7yrSoa/FX5e0EB2j4=
|
||||||
github.com/json-iterator/go v1.1.6/go.mod h1:+SdeFBvtyEkXs7REEP0seUULqWtbJapLOCVDaaPEHmU=
|
github.com/json-iterator/go v1.1.6/go.mod h1:+SdeFBvtyEkXs7REEP0seUULqWtbJapLOCVDaaPEHmU=
|
||||||
|
github.com/json-iterator/go v1.1.9/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4=
|
||||||
github.com/json-iterator/go v1.1.10/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4=
|
github.com/json-iterator/go v1.1.10/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4=
|
||||||
github.com/json-iterator/go v1.1.11/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4=
|
github.com/json-iterator/go v1.1.11/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4=
|
||||||
github.com/json-iterator/go v1.1.12 h1:PV8peI4a0ysnczrg+LtxykD8LfKY9ML6u2jnxaEnrnM=
|
github.com/json-iterator/go v1.1.12 h1:PV8peI4a0ysnczrg+LtxykD8LfKY9ML6u2jnxaEnrnM=
|
||||||
|
@ -401,14 +338,14 @@ github.com/jstemmer/go-junit-report v0.0.0-20190106144839-af01ea7f8024/go.mod h1
|
||||||
github.com/jstemmer/go-junit-report v0.9.1/go.mod h1:Brl9GWCQeLvo8nXZwPNNblvFj/XSXhF0NWZEnDohbsk=
|
github.com/jstemmer/go-junit-report v0.9.1/go.mod h1:Brl9GWCQeLvo8nXZwPNNblvFj/XSXhF0NWZEnDohbsk=
|
||||||
github.com/julienschmidt/httprouter v1.2.0/go.mod h1:SYymIcj16QtmaHHD7aYtjjsJG7VTCxuUUipMqKk8s4w=
|
github.com/julienschmidt/httprouter v1.2.0/go.mod h1:SYymIcj16QtmaHHD7aYtjjsJG7VTCxuUUipMqKk8s4w=
|
||||||
github.com/julienschmidt/httprouter v1.3.0/go.mod h1:JR6WtHb+2LUe8TCKY3cZOxFyyO8IZAc4RVcycCCAKdM=
|
github.com/julienschmidt/httprouter v1.3.0/go.mod h1:JR6WtHb+2LUe8TCKY3cZOxFyyO8IZAc4RVcycCCAKdM=
|
||||||
github.com/kisielk/errcheck v1.5.0/go.mod h1:pFxgyoBC7bSaBwPgfKdkLd5X25qrDl4LWUI2bnpBCr8=
|
|
||||||
github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+oQHNcck=
|
github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+oQHNcck=
|
||||||
github.com/klauspost/compress v1.13.6/go.mod h1:/3/Vjq9QcHkK5uEr5lBEmyoZ1iFhe47etQ6QUkpK6sk=
|
github.com/klauspost/compress v1.10.3/go.mod h1:aoV0uJVorq1K+umq18yTdKaF57EivdYsUV+/s2qKfXs=
|
||||||
|
github.com/klauspost/compress v1.15.11 h1:Lcadnb3RKGin4FYM/orgq0qde+nc15E5Cbqg4B9Sx9c=
|
||||||
|
github.com/klauspost/compress v1.15.11/go.mod h1:QPwzmACJjUTFsnSHH934V6woptycfrDDJnH7hvFVbGM=
|
||||||
github.com/konsorten/go-windows-terminal-sequences v1.0.1/go.mod h1:T0+1ngSBFLxvqU3pZ+m/2kptfBszLMUkC4ZK/EgS/cQ=
|
github.com/konsorten/go-windows-terminal-sequences v1.0.1/go.mod h1:T0+1ngSBFLxvqU3pZ+m/2kptfBszLMUkC4ZK/EgS/cQ=
|
||||||
github.com/konsorten/go-windows-terminal-sequences v1.0.3/go.mod h1:T0+1ngSBFLxvqU3pZ+m/2kptfBszLMUkC4ZK/EgS/cQ=
|
github.com/konsorten/go-windows-terminal-sequences v1.0.3/go.mod h1:T0+1ngSBFLxvqU3pZ+m/2kptfBszLMUkC4ZK/EgS/cQ=
|
||||||
github.com/kr/logfmt v0.0.0-20140226030751-b84e30acd515/go.mod h1:+0opPa2QZZtGFBFZlji/RkVcI2GknAs/DXo4wKdlNEc=
|
github.com/kr/logfmt v0.0.0-20140226030751-b84e30acd515/go.mod h1:+0opPa2QZZtGFBFZlji/RkVcI2GknAs/DXo4wKdlNEc=
|
||||||
github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo=
|
github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo=
|
||||||
github.com/kr/pretty v0.2.0/go.mod h1:ipq/a2n7PKx3OHsz4KJII5eveXtPO4qwEXGdVfWzfnI=
|
|
||||||
github.com/kr/pretty v0.2.1 h1:Fmg33tUaq4/8ym9TJN1x7sLJnHVwhP33CNkpYV/7rwI=
|
github.com/kr/pretty v0.2.1 h1:Fmg33tUaq4/8ym9TJN1x7sLJnHVwhP33CNkpYV/7rwI=
|
||||||
github.com/kr/pretty v0.2.1/go.mod h1:ipq/a2n7PKx3OHsz4KJII5eveXtPO4qwEXGdVfWzfnI=
|
github.com/kr/pretty v0.2.1/go.mod h1:ipq/a2n7PKx3OHsz4KJII5eveXtPO4qwEXGdVfWzfnI=
|
||||||
github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ=
|
github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ=
|
||||||
|
@ -418,30 +355,27 @@ github.com/kr/text v0.2.0 h1:5Nx0Ya0ZqY2ygV366QzturHI13Jq95ApcVaJBhpS+AY=
|
||||||
github.com/kr/text v0.2.0/go.mod h1:eLer722TekiGuMkidMxC/pM04lWEeraHUUmBw8l2grE=
|
github.com/kr/text v0.2.0/go.mod h1:eLer722TekiGuMkidMxC/pM04lWEeraHUUmBw8l2grE=
|
||||||
github.com/kylelemons/godebug v1.1.0 h1:RPNrshWIDI6G2gRW9EHilWtl7Z6Sb1BR0xunSBf0SNc=
|
github.com/kylelemons/godebug v1.1.0 h1:RPNrshWIDI6G2gRW9EHilWtl7Z6Sb1BR0xunSBf0SNc=
|
||||||
github.com/kylelemons/godebug v1.1.0/go.mod h1:9/0rRGxNHcop5bhtWyNeEfOS8JIWk580+fNqagV/RAw=
|
github.com/kylelemons/godebug v1.1.0/go.mod h1:9/0rRGxNHcop5bhtWyNeEfOS8JIWk580+fNqagV/RAw=
|
||||||
|
github.com/leodido/go-urn v1.2.0/go.mod h1:+8+nEpDfqqsY+g338gtMEUOtuK+4dEMhiQEgxpxOKII=
|
||||||
|
github.com/leodido/go-urn v1.2.1 h1:BqpAaACuzVSgi/VLzGZIobT2z4v53pjosyNd9Yv6n/w=
|
||||||
github.com/lunixbochs/vtclean v1.0.0/go.mod h1:pHhQNgMf3btfWnGBVipUOjRYhoOsdGqdm/+2c2E2WMI=
|
github.com/lunixbochs/vtclean v1.0.0/go.mod h1:pHhQNgMf3btfWnGBVipUOjRYhoOsdGqdm/+2c2E2WMI=
|
||||||
github.com/lyft/protoc-gen-validate v0.0.13/go.mod h1:XbGvPuh87YZc5TdIa2/I4pLk0QoUACkjt2znoq26NVQ=
|
|
||||||
github.com/mailru/easyjson v0.0.0-20190312143242-1de009706dbe/go.mod h1:C1wdFJiN94OJF2b5HbByQZoLdCWB1Yqtg26g4irojpc=
|
github.com/mailru/easyjson v0.0.0-20190312143242-1de009706dbe/go.mod h1:C1wdFJiN94OJF2b5HbByQZoLdCWB1Yqtg26g4irojpc=
|
||||||
github.com/mailru/easyjson v0.0.0-20190614124828-94de47d64c63/go.mod h1:C1wdFJiN94OJF2b5HbByQZoLdCWB1Yqtg26g4irojpc=
|
|
||||||
github.com/mailru/easyjson v0.0.0-20190626092158-b2ccc519800e/go.mod h1:C1wdFJiN94OJF2b5HbByQZoLdCWB1Yqtg26g4irojpc=
|
|
||||||
github.com/marten-seemann/qpack v0.2.1/go.mod h1:F7Gl5L1jIgN1D11ucXefiuJS9UMVP2opoCp2jDKb7wc=
|
github.com/marten-seemann/qpack v0.2.1/go.mod h1:F7Gl5L1jIgN1D11ucXefiuJS9UMVP2opoCp2jDKb7wc=
|
||||||
github.com/marten-seemann/qtls-go1-16 v0.1.5 h1:o9JrYPPco/Nukd/HpOHMHZoBDXQqoNtUCmny98/1uqQ=
|
github.com/marten-seemann/qtls-go1-16 v0.1.5 h1:o9JrYPPco/Nukd/HpOHMHZoBDXQqoNtUCmny98/1uqQ=
|
||||||
github.com/marten-seemann/qtls-go1-16 v0.1.5/go.mod h1:gNpI2Ol+lRS3WwSOtIUUtRwZEQMXjYK+dQSBFbethAk=
|
github.com/marten-seemann/qtls-go1-16 v0.1.5/go.mod h1:gNpI2Ol+lRS3WwSOtIUUtRwZEQMXjYK+dQSBFbethAk=
|
||||||
github.com/marten-seemann/qtls-go1-17 v0.1.2 h1:JADBlm0LYiVbuSySCHeY863dNkcpMmDR7s0bLKJeYlQ=
|
github.com/marten-seemann/qtls-go1-17 v0.1.2 h1:JADBlm0LYiVbuSySCHeY863dNkcpMmDR7s0bLKJeYlQ=
|
||||||
github.com/marten-seemann/qtls-go1-17 v0.1.2/go.mod h1:C2ekUKcDdz9SDWxec1N/MvcXBpaX9l3Nx67XaR84L5s=
|
github.com/marten-seemann/qtls-go1-17 v0.1.2/go.mod h1:C2ekUKcDdz9SDWxec1N/MvcXBpaX9l3Nx67XaR84L5s=
|
||||||
github.com/mattn/go-colorable v0.1.8 h1:c1ghPdyEDarC70ftn0y+A/Ee++9zz8ljHG1b13eJ0s8=
|
github.com/mattn/go-colorable v0.1.13 h1:fFA4WZxdEF4tXPZVKMLwD8oUnCTTo08duU7wxecdEvA=
|
||||||
github.com/mattn/go-colorable v0.1.8/go.mod h1:u6P/XSegPjTcexA+o6vUJrdnUu04hMope9wVRipJSqc=
|
github.com/mattn/go-colorable v0.1.13/go.mod h1:7S9/ev0klgBDR4GtXTXX8a3vIGJpMovkB8vQcUbaXHg=
|
||||||
github.com/mattn/go-isatty v0.0.12 h1:wuysRhFDzyxgEmMf5xjvJ2M9dZoWAXNNr5LSBS7uHXY=
|
|
||||||
github.com/mattn/go-isatty v0.0.12/go.mod h1:cbi8OIDigv2wuxKPP5vlRcQ1OAZbq2CE4Kysco4FUpU=
|
github.com/mattn/go-isatty v0.0.12/go.mod h1:cbi8OIDigv2wuxKPP5vlRcQ1OAZbq2CE4Kysco4FUpU=
|
||||||
|
github.com/mattn/go-isatty v0.0.16 h1:bq3VjFmv/sOjHtdEhmkEV4x1AJtvUvOJ2PFAZ5+peKQ=
|
||||||
|
github.com/mattn/go-isatty v0.0.16/go.mod h1:kYGgaQfpe5nmfYZH+SKPsOc2e4SrIfOl2e/yFXSvRLM=
|
||||||
github.com/matttproud/golang_protobuf_extensions v1.0.1 h1:4hp9jkHxhMHkqkrB3Ix0jegS5sx/RkqARlsWZ6pIwiU=
|
github.com/matttproud/golang_protobuf_extensions v1.0.1 h1:4hp9jkHxhMHkqkrB3Ix0jegS5sx/RkqARlsWZ6pIwiU=
|
||||||
github.com/matttproud/golang_protobuf_extensions v1.0.1/go.mod h1:D8He9yQNgCq6Z5Ld7szi9bcBfOoFv/3dc6xSMkL2PC0=
|
github.com/matttproud/golang_protobuf_extensions v1.0.1/go.mod h1:D8He9yQNgCq6Z5Ld7szi9bcBfOoFv/3dc6xSMkL2PC0=
|
||||||
github.com/microcosm-cc/bluemonday v1.0.1/go.mod h1:hsXNsILzKxV+sX77C5b8FSuKF00vh2OMYv+xgHpAMF4=
|
github.com/microcosm-cc/bluemonday v1.0.1/go.mod h1:hsXNsILzKxV+sX77C5b8FSuKF00vh2OMYv+xgHpAMF4=
|
||||||
github.com/miekg/dns v1.1.31/go.mod h1:KNUDUusw/aVsxyTYZM1oqvCicbwhgbNgztCETuNZ7xM=
|
github.com/miekg/dns v1.1.50 h1:DQUfb9uc6smULcREF09Uc+/Gd46YWqJd5DbpPE9xkcA=
|
||||||
github.com/miekg/dns v1.1.45 h1:g5fRIhm9nx7g8osrAvgb16QJfmyMsyOCb+J7LSv+Qzk=
|
github.com/miekg/dns v1.1.50/go.mod h1:e3IlAVfNqAllflbibAZEWOXOQ+Ynzk/dDozDxY7XnME=
|
||||||
github.com/miekg/dns v1.1.45/go.mod h1:e3IlAVfNqAllflbibAZEWOXOQ+Ynzk/dDozDxY7XnME=
|
|
||||||
github.com/mitchellh/go-homedir v1.1.0 h1:lukF9ziXFxDFPkA1vsr5zpc1XuPDn/wFntq5mG+4E0Y=
|
github.com/mitchellh/go-homedir v1.1.0 h1:lukF9ziXFxDFPkA1vsr5zpc1XuPDn/wFntq5mG+4E0Y=
|
||||||
github.com/mitchellh/go-homedir v1.1.0/go.mod h1:SfyaCUpYCn1Vlf4IUYiD9fPX4A5wJrkLzIz1N1q0pr0=
|
github.com/mitchellh/go-homedir v1.1.0/go.mod h1:SfyaCUpYCn1Vlf4IUYiD9fPX4A5wJrkLzIz1N1q0pr0=
|
||||||
github.com/mitchellh/mapstructure v1.1.2/go.mod h1:FVVH3fgwuzCH5S8UJGiWEs2h04kUh9fWfEaFds41c1Y=
|
|
||||||
github.com/moby/spdystream v0.2.0/go.mod h1:f7i0iNDQJ059oMTcWxx8MA/zKFIuD/lY+0GqbN2Wy8c=
|
|
||||||
github.com/modern-go/concurrent v0.0.0-20180228061459-e0a39a4cb421/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
|
github.com/modern-go/concurrent v0.0.0-20180228061459-e0a39a4cb421/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
|
||||||
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd h1:TRLaZ9cD/w8PVh93nsPXa1VrQ6jlwL5oN8l14QlcNfg=
|
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd h1:TRLaZ9cD/w8PVh93nsPXa1VrQ6jlwL5oN8l14QlcNfg=
|
||||||
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
|
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q=
|
||||||
|
@ -449,52 +383,35 @@ github.com/modern-go/reflect2 v0.0.0-20180701023420-4b7aa43c6742/go.mod h1:bx2lN
|
||||||
github.com/modern-go/reflect2 v1.0.1/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0=
|
github.com/modern-go/reflect2 v1.0.1/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0=
|
||||||
github.com/modern-go/reflect2 v1.0.2 h1:xBagoLtFs94CBntxluKeaWgTMpvLxC4ur3nMaC9Gz0M=
|
github.com/modern-go/reflect2 v1.0.2 h1:xBagoLtFs94CBntxluKeaWgTMpvLxC4ur3nMaC9Gz0M=
|
||||||
github.com/modern-go/reflect2 v1.0.2/go.mod h1:yWuevngMOJpCy52FWWMvUC8ws7m/LJsjYzDa0/r8luk=
|
github.com/modern-go/reflect2 v1.0.2/go.mod h1:yWuevngMOJpCy52FWWMvUC8ws7m/LJsjYzDa0/r8luk=
|
||||||
github.com/munnerz/goautoneg v0.0.0-20120707110453-a547fc61f48d/go.mod h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ=
|
|
||||||
github.com/mwitkow/go-conntrack v0.0.0-20161129095857-cc309e4a2223/go.mod h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U=
|
github.com/mwitkow/go-conntrack v0.0.0-20161129095857-cc309e4a2223/go.mod h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U=
|
||||||
github.com/mwitkow/go-conntrack v0.0.0-20190716064945-2f068394615f/go.mod h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U=
|
github.com/mwitkow/go-conntrack v0.0.0-20190716064945-2f068394615f/go.mod h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U=
|
||||||
github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f/go.mod h1:ZdcZmHo+o7JKHSa8/e818NopupXU1YMK5fe1lsApnBw=
|
|
||||||
github.com/neelance/astrewrite v0.0.0-20160511093645-99348263ae86/go.mod h1:kHJEU3ofeGjhHklVoIGuVj85JJwZ6kWPaJwCIxgnFmo=
|
github.com/neelance/astrewrite v0.0.0-20160511093645-99348263ae86/go.mod h1:kHJEU3ofeGjhHklVoIGuVj85JJwZ6kWPaJwCIxgnFmo=
|
||||||
github.com/neelance/sourcemap v0.0.0-20151028013722-8c68805598ab/go.mod h1:Qr6/a/Q4r9LP1IltGz7tA7iOK1WonHEYhu1HRBA7ZiM=
|
github.com/neelance/sourcemap v0.0.0-20151028013722-8c68805598ab/go.mod h1:Qr6/a/Q4r9LP1IltGz7tA7iOK1WonHEYhu1HRBA7ZiM=
|
||||||
github.com/niemeyer/pretty v0.0.0-20200227124842-a10e7caefd8e/go.mod h1:zD1mROLANZcx1PVRCS0qkT7pwLkGfwJo4zjcN/Tysno=
|
|
||||||
github.com/nxadm/tail v1.4.4/go.mod h1:kenIhsEOeOJmVchQTgglprH7qJGnHDVpk1VPCcaMI8A=
|
github.com/nxadm/tail v1.4.4/go.mod h1:kenIhsEOeOJmVchQTgglprH7qJGnHDVpk1VPCcaMI8A=
|
||||||
github.com/nxadm/tail v1.4.8 h1:nPr65rt6Y5JFSKQO7qToXr7pePgD6Gwiw05lkbyAQTE=
|
github.com/nxadm/tail v1.4.8 h1:nPr65rt6Y5JFSKQO7qToXr7pePgD6Gwiw05lkbyAQTE=
|
||||||
github.com/nxadm/tail v1.4.8/go.mod h1:+ncqLTQzXmGhMZNUePPaPqPvBxHAIsmXswZKocGu+AU=
|
github.com/nxadm/tail v1.4.8/go.mod h1:+ncqLTQzXmGhMZNUePPaPqPvBxHAIsmXswZKocGu+AU=
|
||||||
github.com/onsi/ginkgo v0.0.0-20170829012221-11459a886d9c/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE=
|
|
||||||
github.com/onsi/ginkgo v1.6.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE=
|
github.com/onsi/ginkgo v1.6.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE=
|
||||||
github.com/onsi/ginkgo v1.7.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE=
|
|
||||||
github.com/onsi/ginkgo v1.12.1/go.mod h1:zj2OWP4+oCPe1qIXoGWkgMRwljMUYCdkwsT2108oapk=
|
github.com/onsi/ginkgo v1.12.1/go.mod h1:zj2OWP4+oCPe1qIXoGWkgMRwljMUYCdkwsT2108oapk=
|
||||||
github.com/onsi/ginkgo v1.14.0/go.mod h1:iSB4RoI2tjJc9BBv4NKIKWKya62Rps+oPG/Lv9klQyY=
|
github.com/onsi/ginkgo v1.14.0/go.mod h1:iSB4RoI2tjJc9BBv4NKIKWKya62Rps+oPG/Lv9klQyY=
|
||||||
github.com/onsi/ginkgo v1.16.2/go.mod h1:CObGmKUOKaSC0RjmoAK7tKyn4Azo5P2IWuoMnvwxz1E=
|
github.com/onsi/ginkgo v1.16.2/go.mod h1:CObGmKUOKaSC0RjmoAK7tKyn4Azo5P2IWuoMnvwxz1E=
|
||||||
github.com/onsi/ginkgo v1.16.4/go.mod h1:dX+/inL/fNMqNlz0e9LfyB9TswhZpCVdJM/Z6Vvnwo0=
|
github.com/onsi/ginkgo v1.16.4/go.mod h1:dX+/inL/fNMqNlz0e9LfyB9TswhZpCVdJM/Z6Vvnwo0=
|
||||||
github.com/onsi/ginkgo v1.16.5 h1:8xi0RTUf59SOSfEtZMvwTvXYMzG4gV23XVHOZiXNtnE=
|
github.com/onsi/ginkgo v1.16.5 h1:8xi0RTUf59SOSfEtZMvwTvXYMzG4gV23XVHOZiXNtnE=
|
||||||
github.com/onsi/ginkgo v1.16.5/go.mod h1:+E8gABHa3K6zRBolWtd+ROzc/U5bkGt0FwiG042wbpU=
|
github.com/onsi/ginkgo v1.16.5/go.mod h1:+E8gABHa3K6zRBolWtd+ROzc/U5bkGt0FwiG042wbpU=
|
||||||
github.com/onsi/gomega v0.0.0-20170829124025-dcabb60a477c/go.mod h1:C1qb7wdrVGGVU+Z6iS04AVkA3Q65CEZX59MT0QO5uiA=
|
|
||||||
github.com/onsi/gomega v1.4.3/go.mod h1:ex+gbHU/CVuBBDIJjb2X0qEXbFg53c61hWP/1CpauHY=
|
|
||||||
github.com/onsi/gomega v1.7.1/go.mod h1:XdKZgCCFLUoM/7CFJVPcG8C1xQ1AJ0vpAezJrB7JYyY=
|
github.com/onsi/gomega v1.7.1/go.mod h1:XdKZgCCFLUoM/7CFJVPcG8C1xQ1AJ0vpAezJrB7JYyY=
|
||||||
github.com/onsi/gomega v1.10.1/go.mod h1:iN09h71vgCQne3DLsj+A5owkum+a2tYe+TOCB1ybHNo=
|
github.com/onsi/gomega v1.10.1/go.mod h1:iN09h71vgCQne3DLsj+A5owkum+a2tYe+TOCB1ybHNo=
|
||||||
github.com/onsi/gomega v1.13.0/go.mod h1:lRk9szgn8TxENtWd0Tp4c3wjlRfMTMH27I+3Je41yGY=
|
github.com/onsi/gomega v1.13.0/go.mod h1:lRk9szgn8TxENtWd0Tp4c3wjlRfMTMH27I+3Je41yGY=
|
||||||
github.com/onsi/gomega v1.16.0 h1:6gjqkI8iiRHMvdccRJM8rVKjCWk6ZIm6FTm3ddIe4/c=
|
github.com/onsi/gomega v1.23.0 h1:/oxKu9c2HVap+F3PfKort2Hw5DEU+HGlW8n+tguWsys=
|
||||||
github.com/onsi/gomega v1.16.0/go.mod h1:HnhC7FXeEQY45zxNK3PPoIUhzk/80Xly9PcubAlGdZY=
|
github.com/onsi/gomega v1.23.0/go.mod h1:Z/NWtiqwBrwUt4/2loMmHL63EDLnYHmVbuBpDr2vQAg=
|
||||||
github.com/opentracing-contrib/go-observer v0.0.0-20170622124052-a52f23424492/go.mod h1:Ngi6UdF0k5OKD5t5wlmGhe/EDKPoUM3BXZSSfIuJbis=
|
|
||||||
github.com/opentracing/opentracing-go v1.1.0/go.mod h1:UkNAQd3GIcIGf0SeVgPpRdFStlNbqXla1AfSYxPUl2o=
|
|
||||||
github.com/opentracing/opentracing-go v1.2.0 h1:uEJPy/1a5RIPAJ0Ov+OIO8OxWu77jEv+1B0VhjKrZUs=
|
github.com/opentracing/opentracing-go v1.2.0 h1:uEJPy/1a5RIPAJ0Ov+OIO8OxWu77jEv+1B0VhjKrZUs=
|
||||||
github.com/opentracing/opentracing-go v1.2.0/go.mod h1:GxEUsuufX4nBwe+T+Wl9TAgYrxe9dPLANfrWvHYVTgc=
|
github.com/opentracing/opentracing-go v1.2.0/go.mod h1:GxEUsuufX4nBwe+T+Wl9TAgYrxe9dPLANfrWvHYVTgc=
|
||||||
github.com/openzipkin-contrib/zipkin-go-opentracing v0.4.5/go.mod h1:/wsWhb9smxSfWAKL3wpBW7V8scJMt8N8gnaMCS9E/cA=
|
|
||||||
github.com/openzipkin/zipkin-go v0.1.1/go.mod h1:NtoC/o8u3JlF1lSlyPNswIbeQH9bJTmOf0Erfk+hxe8=
|
github.com/openzipkin/zipkin-go v0.1.1/go.mod h1:NtoC/o8u3JlF1lSlyPNswIbeQH9bJTmOf0Erfk+hxe8=
|
||||||
github.com/openzipkin/zipkin-go v0.2.1/go.mod h1:NaW6tEwdmWMaCDZzg8sh+IBNOxHMPnhQw8ySjnjRyN4=
|
github.com/pelletier/go-toml/v2 v2.0.5 h1:ipoSadvV8oGUjnUbMub59IDPPwfxF694nG/jwbMiyQg=
|
||||||
github.com/openzipkin/zipkin-go v0.3.0/go.mod h1:4c3sLeE8xjNqehmF5RpAFLPLJxXscc0R4l6Zg0P1tTQ=
|
|
||||||
github.com/oschwald/geoip2-golang v1.5.0/go.mod h1:xdvYt5xQzB8ORWFqPnqMwZpCpgNagttWdoZLlJQzg7s=
|
|
||||||
github.com/oschwald/maxminddb-golang v1.8.0/go.mod h1:RXZtst0N6+FY/3qCNmZMBApR19cdQj43/NM9VkrNAis=
|
|
||||||
github.com/peterbourgon/diskv v2.0.1+incompatible/go.mod h1:uqqh8zWWbv1HBMNONnaR/tNboyR3/BZd58JJSHlUSCU=
|
|
||||||
github.com/philhofer/fwd v1.1.1 h1:GdGcTjf5RNAxwS4QLsiMzJYj5KEvPJD3Abr261yRQXQ=
|
github.com/philhofer/fwd v1.1.1 h1:GdGcTjf5RNAxwS4QLsiMzJYj5KEvPJD3Abr261yRQXQ=
|
||||||
github.com/philhofer/fwd v1.1.1/go.mod h1:gk3iGcWd9+svBvR0sR+KPcfE+RNWozjowpeBVG3ZVNU=
|
github.com/pingcap/errors v0.11.4 h1:lFuQV/oaUMGcD2tqt+01ROSmJs75VG1ToEOkZIZ4nE4=
|
||||||
github.com/pierrec/lz4 v1.0.2-0.20190131084431-473cd7ce01a1/go.mod h1:3/3N9NVKO0jef7pBehbT1qWhCMrIgbYNnFAZCqQ5LRc=
|
|
||||||
github.com/pierrec/lz4 v2.6.1+incompatible/go.mod h1:pdkljMzZIN41W+lC3N2tnIh5sFi+IEE17M5jbnwPHcY=
|
|
||||||
github.com/pkg/errors v0.8.0/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
|
github.com/pkg/errors v0.8.0/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
|
||||||
github.com/pkg/errors v0.8.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
|
github.com/pkg/errors v0.8.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
|
||||||
github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4=
|
github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4=
|
||||||
github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
|
github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
|
||||||
github.com/pkg/profile v1.2.1/go.mod h1:hJw3o1OdXxsrSjjVksARp5W95eeEaEfptyVZyv6JUPA=
|
|
||||||
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
|
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
|
||||||
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
|
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
|
||||||
github.com/pquerna/cachecontrol v0.0.0-20180517163645-1555304b9b35 h1:J9b7z+QKAmPf4YLrFg6oQUotqHQeUNWwkvo7jZp1GLU=
|
github.com/pquerna/cachecontrol v0.0.0-20180517163645-1555304b9b35 h1:J9b7z+QKAmPf4YLrFg6oQUotqHQeUNWwkvo7jZp1GLU=
|
||||||
|
@ -504,8 +421,9 @@ github.com/prometheus/client_golang v0.9.1/go.mod h1:7SWBe2y4D6OKWSNQJUaRYU/AaXP
|
||||||
github.com/prometheus/client_golang v1.0.0/go.mod h1:db9x61etRT2tGnBNRi70OPL5FsnadC4Ky3P0J6CfImo=
|
github.com/prometheus/client_golang v1.0.0/go.mod h1:db9x61etRT2tGnBNRi70OPL5FsnadC4Ky3P0J6CfImo=
|
||||||
github.com/prometheus/client_golang v1.7.1/go.mod h1:PY5Wy2awLA44sXw4AOSfFBetzPP4j5+D6mVACh+pe2M=
|
github.com/prometheus/client_golang v1.7.1/go.mod h1:PY5Wy2awLA44sXw4AOSfFBetzPP4j5+D6mVACh+pe2M=
|
||||||
github.com/prometheus/client_golang v1.11.0/go.mod h1:Z6t4BnS23TR94PD6BsDNk8yVqroYurpAkEiz0P2BEV0=
|
github.com/prometheus/client_golang v1.11.0/go.mod h1:Z6t4BnS23TR94PD6BsDNk8yVqroYurpAkEiz0P2BEV0=
|
||||||
github.com/prometheus/client_golang v1.12.1 h1:ZiaPsmm9uiBeaSMRznKsCDNtPCS0T3JVDGF+06gjBzk=
|
|
||||||
github.com/prometheus/client_golang v1.12.1/go.mod h1:3Z9XVyYiZYEO+YQWt3RD2R3jrbd179Rt297l4aS6nDY=
|
github.com/prometheus/client_golang v1.12.1/go.mod h1:3Z9XVyYiZYEO+YQWt3RD2R3jrbd179Rt297l4aS6nDY=
|
||||||
|
github.com/prometheus/client_golang v1.13.0 h1:b71QUfeo5M8gq2+evJdTPfZhYMAU0uKPkyPJ7TPsloU=
|
||||||
|
github.com/prometheus/client_golang v1.13.0/go.mod h1:vTeo+zgvILHsnnj/39Ou/1fPN5nJFOEMgftOUOmlvYQ=
|
||||||
github.com/prometheus/client_model v0.0.0-20180712105110-5c3871d89910/go.mod h1:MbSGuTsp3dbXC40dX6PRTWyKYBIrTGTE9sqQNg2J8bo=
|
github.com/prometheus/client_model v0.0.0-20180712105110-5c3871d89910/go.mod h1:MbSGuTsp3dbXC40dX6PRTWyKYBIrTGTE9sqQNg2J8bo=
|
||||||
github.com/prometheus/client_model v0.0.0-20190129233127-fd36f4220a90/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
|
github.com/prometheus/client_model v0.0.0-20190129233127-fd36f4220a90/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
|
||||||
github.com/prometheus/client_model v0.0.0-20190812154241-14fe0d1b01d4/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
|
github.com/prometheus/client_model v0.0.0-20190812154241-14fe0d1b01d4/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
|
||||||
|
@ -515,18 +433,17 @@ github.com/prometheus/common v0.0.0-20180801064454-c7de2306084e/go.mod h1:daVV7q
|
||||||
github.com/prometheus/common v0.4.1/go.mod h1:TNfzLD0ON7rHzMJeJkieUDPYmFC7Snx/y86RQel1bk4=
|
github.com/prometheus/common v0.4.1/go.mod h1:TNfzLD0ON7rHzMJeJkieUDPYmFC7Snx/y86RQel1bk4=
|
||||||
github.com/prometheus/common v0.10.0/go.mod h1:Tlit/dnDKsSWFlCLTWaA1cyBgKHSMdTB80sz/V91rCo=
|
github.com/prometheus/common v0.10.0/go.mod h1:Tlit/dnDKsSWFlCLTWaA1cyBgKHSMdTB80sz/V91rCo=
|
||||||
github.com/prometheus/common v0.26.0/go.mod h1:M7rCNAaPfAosfx8veZJCuw84e35h3Cfd9VFqTh1DIvc=
|
github.com/prometheus/common v0.26.0/go.mod h1:M7rCNAaPfAosfx8veZJCuw84e35h3Cfd9VFqTh1DIvc=
|
||||||
github.com/prometheus/common v0.32.1 h1:hWIdL3N2HoUx3B8j3YN9mWor0qhY/NlEKZEaXxuIRh4=
|
|
||||||
github.com/prometheus/common v0.32.1/go.mod h1:vu+V0TpY+O6vW9J44gczi3Ap/oXXR10b+M/gUGO4Hls=
|
github.com/prometheus/common v0.32.1/go.mod h1:vu+V0TpY+O6vW9J44gczi3Ap/oXXR10b+M/gUGO4Hls=
|
||||||
|
github.com/prometheus/common v0.37.0 h1:ccBbHCgIiT9uSoFY0vX8H3zsNR5eLt17/RQLUvn8pXE=
|
||||||
|
github.com/prometheus/common v0.37.0/go.mod h1:phzohg0JFMnBEFGxTDbfu3QyL5GI8gTQJFhYO5B3mfA=
|
||||||
github.com/prometheus/procfs v0.0.0-20180725123919-05ee40e3a273/go.mod h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk=
|
github.com/prometheus/procfs v0.0.0-20180725123919-05ee40e3a273/go.mod h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk=
|
||||||
github.com/prometheus/procfs v0.0.0-20181005140218-185b4288413d/go.mod h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk=
|
github.com/prometheus/procfs v0.0.0-20181005140218-185b4288413d/go.mod h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk=
|
||||||
github.com/prometheus/procfs v0.0.2/go.mod h1:TjEm7ze935MbeOT/UhFTIMYKhuLP4wbCsTZCD3I8kEA=
|
github.com/prometheus/procfs v0.0.2/go.mod h1:TjEm7ze935MbeOT/UhFTIMYKhuLP4wbCsTZCD3I8kEA=
|
||||||
github.com/prometheus/procfs v0.1.3/go.mod h1:lV6e/gmhEcM9IjHGsFOCxxuZ+z1YqCvr4OA4YeYWdaU=
|
github.com/prometheus/procfs v0.1.3/go.mod h1:lV6e/gmhEcM9IjHGsFOCxxuZ+z1YqCvr4OA4YeYWdaU=
|
||||||
github.com/prometheus/procfs v0.6.0/go.mod h1:cz+aTbrPOrUb4q7XlbU9ygM+/jj0fzG6c1xBZuNvfVA=
|
github.com/prometheus/procfs v0.6.0/go.mod h1:cz+aTbrPOrUb4q7XlbU9ygM+/jj0fzG6c1xBZuNvfVA=
|
||||||
github.com/prometheus/procfs v0.7.3 h1:4jVXhlkAyzOScmCkXBTOLRLTz8EeU+eyjrwB/EPq0VU=
|
|
||||||
github.com/prometheus/procfs v0.7.3/go.mod h1:cz+aTbrPOrUb4q7XlbU9ygM+/jj0fzG6c1xBZuNvfVA=
|
github.com/prometheus/procfs v0.7.3/go.mod h1:cz+aTbrPOrUb4q7XlbU9ygM+/jj0fzG6c1xBZuNvfVA=
|
||||||
github.com/rabbitmq/amqp091-go v1.1.0/go.mod h1:ogQDLSOACsLPsIq0NpbtiifNZi2YOz0VTJ0kHRghqbM=
|
github.com/prometheus/procfs v0.8.0 h1:ODq8ZFEaYeCaZOJlZZdJA2AbQR98dSHSM1KW/You5mo=
|
||||||
github.com/rcrowley/go-metrics v0.0.0-20181016184325-3113b8401b8a/go.mod h1:bCqnVzQkZxMG4s8nGwiZ5l3QUCyqpo9Y+/ZMZ9VjZe4=
|
github.com/prometheus/procfs v0.8.0/go.mod h1:z7EfXMXOkbkqb9IINtpCn86r/to3BnA0uaxHdg830/4=
|
||||||
github.com/rcrowley/go-metrics v0.0.0-20201227073835-cf1acfcdf475/go.mod h1:bCqnVzQkZxMG4s8nGwiZ5l3QUCyqpo9Y+/ZMZ9VjZe4=
|
|
||||||
github.com/rogpeppe/fastuuid v1.2.0/go.mod h1:jVj6XXZzXRy/MSR5jhDC/2q6DgLz+nrA6LYCDYWNEvQ=
|
github.com/rogpeppe/fastuuid v1.2.0/go.mod h1:jVj6XXZzXRy/MSR5jhDC/2q6DgLz+nrA6LYCDYWNEvQ=
|
||||||
github.com/rogpeppe/go-internal v1.3.0/go.mod h1:M8bDsm7K2OlrFYOpmOWEs/qY81heoFRclV5y23lUDJ4=
|
github.com/rogpeppe/go-internal v1.3.0/go.mod h1:M8bDsm7K2OlrFYOpmOWEs/qY81heoFRclV5y23lUDJ4=
|
||||||
github.com/rs/xid v1.2.1/go.mod h1:+uKXf+4Djp6Md1KODXJxgGQPKngRmWyn10oCKFzNHOQ=
|
github.com/rs/xid v1.2.1/go.mod h1:+uKXf+4Djp6Md1KODXJxgGQPKngRmWyn10oCKFzNHOQ=
|
||||||
|
@ -563,42 +480,36 @@ github.com/shurcooL/webdavfs v0.0.0-20170829043945-18c3829fa133/go.mod h1:hKmq5k
|
||||||
github.com/sirupsen/logrus v1.2.0/go.mod h1:LxeOpSwHxABJmUn/MG1IvRgCAasNZTLOkJPxbbu5VWo=
|
github.com/sirupsen/logrus v1.2.0/go.mod h1:LxeOpSwHxABJmUn/MG1IvRgCAasNZTLOkJPxbbu5VWo=
|
||||||
github.com/sirupsen/logrus v1.4.2/go.mod h1:tLMulIdttU9McNUspp0xgXVQah82FyeX6MwdIuYE2rE=
|
github.com/sirupsen/logrus v1.4.2/go.mod h1:tLMulIdttU9McNUspp0xgXVQah82FyeX6MwdIuYE2rE=
|
||||||
github.com/sirupsen/logrus v1.6.0/go.mod h1:7uNnSEd1DgxDLC74fIahvMZmmYsHGZGEOFrfsX/uA88=
|
github.com/sirupsen/logrus v1.6.0/go.mod h1:7uNnSEd1DgxDLC74fIahvMZmmYsHGZGEOFrfsX/uA88=
|
||||||
github.com/sirupsen/logrus v1.7.0/go.mod h1:yWOB1SBYBC5VeMP7gHvWumXLIWorT60ONWic61uBYv0=
|
|
||||||
github.com/sirupsen/logrus v1.8.1/go.mod h1:yWOB1SBYBC5VeMP7gHvWumXLIWorT60ONWic61uBYv0=
|
|
||||||
github.com/sourcegraph/annotate v0.0.0-20160123013949-f4cad6c6324d/go.mod h1:UdhH50NIW0fCiwBSr0co2m7BnFLdv4fQTgdqdJTHFeE=
|
github.com/sourcegraph/annotate v0.0.0-20160123013949-f4cad6c6324d/go.mod h1:UdhH50NIW0fCiwBSr0co2m7BnFLdv4fQTgdqdJTHFeE=
|
||||||
github.com/sourcegraph/syntaxhighlight v0.0.0-20170531221838-bd320f5d308e/go.mod h1:HuIsMU8RRBOtsCgI77wP899iHVBQpCmg4ErYMZB+2IA=
|
github.com/sourcegraph/syntaxhighlight v0.0.0-20170531221838-bd320f5d308e/go.mod h1:HuIsMU8RRBOtsCgI77wP899iHVBQpCmg4ErYMZB+2IA=
|
||||||
github.com/spaolacci/murmur3 v0.0.0-20180118202830-f09979ecbc72/go.mod h1:JwIasOWyU6f++ZhiEuf87xNszmSA2myDM2Kzu9HwQUA=
|
github.com/spaolacci/murmur3 v0.0.0-20180118202830-f09979ecbc72/go.mod h1:JwIasOWyU6f++ZhiEuf87xNszmSA2myDM2Kzu9HwQUA=
|
||||||
github.com/spf13/afero v1.2.2/go.mod h1:9ZxEEn6pIJ8Rxe320qSDBk6AsU0r9pR7Q4OcevTdifk=
|
|
||||||
github.com/spf13/pflag v1.0.5/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
|
|
||||||
github.com/stoewer/go-strcase v1.2.0/go.mod h1:IBiWB2sKIp3wVVQ3Y035++gc+knqhUQag1KpM8ahLw8=
|
|
||||||
github.com/streadway/amqp v0.0.0-20190404075320-75d898a42a94/go.mod h1:AZpEONHx3DKn8O/DFsRAY58/XVQiIPMTMB1SddzLXVw=
|
|
||||||
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
|
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
|
||||||
github.com/stretchr/objx v0.1.1/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
|
github.com/stretchr/objx v0.1.1/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
|
||||||
github.com/stretchr/objx v0.2.0/go.mod h1:qt09Ya8vawLte6SNmTgCsAVtYtaKzEcn8ATUoHMkEqE=
|
github.com/stretchr/objx v0.4.0/go.mod h1:YvHI0jy2hoMjB+UWwv71VJQ9isScKT/TqJzVSSt89Yw=
|
||||||
|
github.com/stretchr/objx v0.5.0/go.mod h1:Yh+to48EsGEfYuaHDzXPcE3xhTkx73EhmCGUpEOglKo=
|
||||||
github.com/stretchr/testify v1.2.2/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs=
|
github.com/stretchr/testify v1.2.2/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs=
|
||||||
github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI=
|
github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI=
|
||||||
github.com/stretchr/testify v1.4.0/go.mod h1:j7eGeouHqKxXV5pUuKE4zz7dFj8WfuZ+81PSLYec5m4=
|
github.com/stretchr/testify v1.4.0/go.mod h1:j7eGeouHqKxXV5pUuKE4zz7dFj8WfuZ+81PSLYec5m4=
|
||||||
github.com/stretchr/testify v1.5.1/go.mod h1:5W2xD1RspED5o8YsWQXVCued0rvSQ+mT+I5cxcmMvtA=
|
github.com/stretchr/testify v1.5.1/go.mod h1:5W2xD1RspED5o8YsWQXVCued0rvSQ+mT+I5cxcmMvtA=
|
||||||
github.com/stretchr/testify v1.6.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
|
github.com/stretchr/testify v1.6.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
|
||||||
github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
|
github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
|
||||||
github.com/stretchr/testify v1.7.1 h1:5TQK59W5E3v0r2duFAb7P95B6hEeOyEnHRa8MjYSMTY=
|
|
||||||
github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
|
github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
|
||||||
|
github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=
|
||||||
|
github.com/stretchr/testify v1.8.1 h1:w7B6lhMri9wdJUVmEZPGGhZzrYTPvgJArz7wNPgYKsk=
|
||||||
|
github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
|
||||||
github.com/tarm/serial v0.0.0-20180830185346-98f6abe2eb07/go.mod h1:kDXzergiv9cbyO7IOYJZWg1U88JhDg3PB6klq9Hg2pA=
|
github.com/tarm/serial v0.0.0-20180830185346-98f6abe2eb07/go.mod h1:kDXzergiv9cbyO7IOYJZWg1U88JhDg3PB6klq9Hg2pA=
|
||||||
github.com/tinylib/msgp v1.1.2 h1:gWmO7n0Ys2RBEb7GPYB9Ujq8Mk5p2U08lRnmMcGy6BQ=
|
github.com/tinylib/msgp v1.1.2 h1:gWmO7n0Ys2RBEb7GPYB9Ujq8Mk5p2U08lRnmMcGy6BQ=
|
||||||
github.com/tinylib/msgp v1.1.2/go.mod h1:+d+yLhGm8mzTaHzB+wgMYrodPfmZrzkirds8fDWklFE=
|
github.com/ugorji/go v1.1.7 h1:/68gy2h+1mWMrwZFeD1kQialdSzAb432dtpeJ42ovdo=
|
||||||
|
github.com/ugorji/go v1.1.7/go.mod h1:kZn38zHttfInRq0xu/PH0az30d+z6vm202qpg1oXVMw=
|
||||||
|
github.com/ugorji/go/codec v1.1.7/go.mod h1:Ax+UKWsSmolVDwsd+7N3ZtXu+yMGCf907BLYF3GoBXY=
|
||||||
|
github.com/ugorji/go/codec v1.2.7 h1:YPXUKf7fYbp/y8xloBqZOw2qaVggbfwMlI8WM3wZUJ0=
|
||||||
github.com/viant/assertly v0.4.8/go.mod h1:aGifi++jvCrUaklKEKT0BU95igDNaqkvz+49uaYMPRU=
|
github.com/viant/assertly v0.4.8/go.mod h1:aGifi++jvCrUaklKEKT0BU95igDNaqkvz+49uaYMPRU=
|
||||||
github.com/viant/toolbox v0.24.0/go.mod h1:OxMCG57V0PXuIP2HNQrtJf2CjqdmbrOx5EkMILuUhzM=
|
github.com/viant/toolbox v0.24.0/go.mod h1:OxMCG57V0PXuIP2HNQrtJf2CjqdmbrOx5EkMILuUhzM=
|
||||||
github.com/xdg-go/pbkdf2 v1.0.0/go.mod h1:jrpuAogTd400dnrH08LKmI/xc1MbPOebTwRqcT5RDeI=
|
|
||||||
github.com/xdg-go/scram v1.0.2/go.mod h1:1WAq6h33pAW+iRreB34OORO2Nf7qel3VV3fjBj+hCSs=
|
|
||||||
github.com/xdg-go/stringprep v1.0.2/go.mod h1:8F9zXuvzgwmyT5DUm4GUfZGDdT3W+LCvS6+da4O5kxM=
|
|
||||||
github.com/yuin/goldmark v1.1.25/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
|
github.com/yuin/goldmark v1.1.25/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
|
||||||
github.com/yuin/goldmark v1.1.27/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
|
github.com/yuin/goldmark v1.1.27/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
|
||||||
github.com/yuin/goldmark v1.1.32/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
|
github.com/yuin/goldmark v1.1.32/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
|
||||||
github.com/yuin/goldmark v1.2.1/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
|
github.com/yuin/goldmark v1.2.1/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
|
||||||
github.com/yuin/goldmark v1.3.5/go.mod h1:mwnBkeHKe2W/ZEtQ+71ViKU8L12m81fl3OWwC1Zlc8k=
|
github.com/yuin/goldmark v1.3.5/go.mod h1:mwnBkeHKe2W/ZEtQ+71ViKU8L12m81fl3OWwC1Zlc8k=
|
||||||
go.etcd.io/etcd/api/v3 v3.5.1/go.mod h1:cbVKeC6lCfl7j/8jBhAK6aIYO9XOjdptoxU/nLQcPvs=
|
|
||||||
go.etcd.io/etcd/client/pkg/v3 v3.5.1/go.mod h1:IJHfcCEKxYu1Os13ZdwCwIUTUVGYTSAM3YSwc9/Ac1g=
|
|
||||||
go.etcd.io/etcd/client/v3 v3.5.1/go.mod h1:OnjH4M8OnAotwaB2l9bVgZzRFKru7/ZMoS46OtKyd3Q=
|
|
||||||
go.opencensus.io v0.18.0/go.mod h1:vKdFvxhtzZ9onBp9VKHK8z/sRpBMnKAsufL7wlDrCOA=
|
go.opencensus.io v0.18.0/go.mod h1:vKdFvxhtzZ9onBp9VKHK8z/sRpBMnKAsufL7wlDrCOA=
|
||||||
go.opencensus.io v0.21.0/go.mod h1:mSImk1erAIZhrmZN+AvHh14ztQfjbGwt4TtuofqLduU=
|
go.opencensus.io v0.21.0/go.mod h1:mSImk1erAIZhrmZN+AvHh14ztQfjbGwt4TtuofqLduU=
|
||||||
go.opencensus.io v0.22.0/go.mod h1:+kGneAE2xo2IficOXnaByMWTGM9T73dGwxeWcUqIpI8=
|
go.opencensus.io v0.22.0/go.mod h1:+kGneAE2xo2IficOXnaByMWTGM9T73dGwxeWcUqIpI8=
|
||||||
|
@ -623,11 +534,8 @@ go.opentelemetry.io/otel/trace v1.6.3/go.mod h1:GNJQusJlUgZl9/TQBPKU/Y/ty+0iVB5f
|
||||||
go.opentelemetry.io/proto/otlp v0.7.0/go.mod h1:PqfVotwruBrMGOCsRd/89rSnXhoiJIqeYNgFYFoEGnI=
|
go.opentelemetry.io/proto/otlp v0.7.0/go.mod h1:PqfVotwruBrMGOCsRd/89rSnXhoiJIqeYNgFYFoEGnI=
|
||||||
go.opentelemetry.io/proto/otlp v0.15.0 h1:h0bKrvdrT/9sBwEJ6iWUqT/N/xPcS66bL4u3isneJ6w=
|
go.opentelemetry.io/proto/otlp v0.15.0 h1:h0bKrvdrT/9sBwEJ6iWUqT/N/xPcS66bL4u3isneJ6w=
|
||||||
go.opentelemetry.io/proto/otlp v0.15.0/go.mod h1:H7XAot3MsfNsj7EXtrA2q5xSNQ10UqI405h3+duxN4U=
|
go.opentelemetry.io/proto/otlp v0.15.0/go.mod h1:H7XAot3MsfNsj7EXtrA2q5xSNQ10UqI405h3+duxN4U=
|
||||||
go.uber.org/atomic v1.7.0/go.mod h1:fEN4uk6kAWBTFdckzkM89CLk9XfWZrxpCo0nPH17wJc=
|
|
||||||
go.uber.org/automaxprocs v1.4.0 h1:CpDZl6aOlLhReez+8S3eEotD7Jx0Os++lemPlMULQP0=
|
go.uber.org/automaxprocs v1.4.0 h1:CpDZl6aOlLhReez+8S3eEotD7Jx0Os++lemPlMULQP0=
|
||||||
go.uber.org/automaxprocs v1.4.0/go.mod h1:/mTEdr7LvHhs0v7mjdxDreTz1OG5zdZGqgOnhWiR/+Q=
|
go.uber.org/automaxprocs v1.4.0/go.mod h1:/mTEdr7LvHhs0v7mjdxDreTz1OG5zdZGqgOnhWiR/+Q=
|
||||||
go.uber.org/multierr v1.6.0/go.mod h1:cdWPpRnG4AhwMwsgIHip0KRBQjJy5kYEpYjJxpXp9iU=
|
|
||||||
go.uber.org/zap v1.17.0/go.mod h1:MXVU+bhUf/A7Xi2HNOnopQOrmycQ5Ih87HtOu4q5SSo=
|
|
||||||
go4.org v0.0.0-20180809161055-417644f6feb5/go.mod h1:MkTOUMDaeVYJUOUsaDXIhWPZYa1yOyC1qaOBpL57BhE=
|
go4.org v0.0.0-20180809161055-417644f6feb5/go.mod h1:MkTOUMDaeVYJUOUsaDXIhWPZYa1yOyC1qaOBpL57BhE=
|
||||||
golang.org/x/build v0.0.0-20190111050920-041ab4dc3f9d/go.mod h1:OWs+y06UdEOHN4y+MfF/py+xQ/tYqIWW03b70/CG9Rw=
|
golang.org/x/build v0.0.0-20190111050920-041ab4dc3f9d/go.mod h1:OWs+y06UdEOHN4y+MfF/py+xQ/tYqIWW03b70/CG9Rw=
|
||||||
golang.org/x/crypto v0.0.0-20180904163835-0709b304e793/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4=
|
golang.org/x/crypto v0.0.0-20180904163835-0709b304e793/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4=
|
||||||
|
@ -636,17 +544,13 @@ golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACk
|
||||||
golang.org/x/crypto v0.0.0-20190313024323-a1f597ede03a/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
|
golang.org/x/crypto v0.0.0-20190313024323-a1f597ede03a/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
|
||||||
golang.org/x/crypto v0.0.0-20190510104115-cbcb75029529/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
|
golang.org/x/crypto v0.0.0-20190510104115-cbcb75029529/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
|
||||||
golang.org/x/crypto v0.0.0-20190605123033-f99c8df09eb5/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
|
golang.org/x/crypto v0.0.0-20190605123033-f99c8df09eb5/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
|
||||||
|
golang.org/x/crypto v0.0.0-20190911031432-227b76d455e7/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
|
||||||
golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
|
golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
|
||||||
golang.org/x/crypto v0.0.0-20200221231518-2aa609cf4a9d/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
|
golang.org/x/crypto v0.0.0-20200221231518-2aa609cf4a9d/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
|
||||||
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
|
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
|
||||||
golang.org/x/crypto v0.0.0-20201002170205-7f63de1d35b0/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
|
|
||||||
golang.org/x/crypto v0.0.0-20201112155050-0c6587e931a9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
|
|
||||||
golang.org/x/crypto v0.0.0-20210817164053-32db794688a5/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc=
|
|
||||||
golang.org/x/crypto v0.0.0-20210920023735-84f357641f63/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc=
|
|
||||||
golang.org/x/crypto v0.0.0-20210921155107-089bfa567519/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc=
|
|
||||||
golang.org/x/crypto v0.0.0-20220722155217-630584e8d5aa/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4=
|
golang.org/x/crypto v0.0.0-20220722155217-630584e8d5aa/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4=
|
||||||
golang.org/x/crypto v0.2.0 h1:BRXPfhNivWL5Yq0BGQ39a2sW6t44aODpfxkWjYdzewE=
|
golang.org/x/crypto v0.8.0 h1:pd9TJtTueMTVQXzk8E2XESSMQDj/U7OUu0PqJqPXQjQ=
|
||||||
golang.org/x/crypto v0.2.0/go.mod h1:hebNnKkNXi2UzZN1eVRvBB7co0a+JxK6XbPiWVs/3J4=
|
golang.org/x/crypto v0.8.0/go.mod h1:mRqEX+O9/h5TFCrQhkgjo2yKi0yYA+9ecGkdQoHrywE=
|
||||||
golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
|
golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
|
||||||
golang.org/x/exp v0.0.0-20190306152737-a1d7652674e8/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
|
golang.org/x/exp v0.0.0-20190306152737-a1d7652674e8/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
|
||||||
golang.org/x/exp v0.0.0-20190510132918-efd6b22b2522/go.mod h1:ZjyILWgesfNpC6sMxTJOJm9Kp84zZh5NQWvqDGG3Qr8=
|
golang.org/x/exp v0.0.0-20190510132918-efd6b22b2522/go.mod h1:ZjyILWgesfNpC6sMxTJOJm9Kp84zZh5NQWvqDGG3Qr8=
|
||||||
|
@ -683,8 +587,8 @@ golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
|
||||||
golang.org/x/mod v0.4.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
|
golang.org/x/mod v0.4.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
|
||||||
golang.org/x/mod v0.4.1/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
|
golang.org/x/mod v0.4.1/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
|
||||||
golang.org/x/mod v0.4.2/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
|
golang.org/x/mod v0.4.2/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
|
||||||
golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4 h1:6zppjxzCulZykYSLyVDYbneBfbaBIQPYMevg0bEwv2s=
|
golang.org/x/mod v0.8.0 h1:LUYupSeNrTNCGzR/hVBk2NHZO4hXcVaW1k4Qx7rjPx8=
|
||||||
golang.org/x/mod v0.6.0-dev.0.20220419223038-86c51ed26bb4/go.mod h1:jJ57K6gSWd91VN4djpZkiMVwK6gcyfeH4XE8wZrZaV4=
|
golang.org/x/mod v0.8.0/go.mod h1:iBbtSCu2XBx23ZKBPSOrRkjjQPZFPuis4dIYUhu/chs=
|
||||||
golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
|
golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
|
||||||
golang.org/x/net v0.0.0-20180826012351-8a410e7b638d/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
|
golang.org/x/net v0.0.0-20180826012351-8a410e7b638d/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
|
||||||
golang.org/x/net v0.0.0-20180906233101-161cd47e91fd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
|
golang.org/x/net v0.0.0-20180906233101-161cd47e91fd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
|
||||||
|
@ -703,8 +607,6 @@ golang.org/x/net v0.0.0-20190613194153-d28f0bde5980/go.mod h1:z5CRVTTTmAJ677TzLL
|
||||||
golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
||||||
golang.org/x/net v0.0.0-20190628185345-da137c7871d7/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
golang.org/x/net v0.0.0-20190628185345-da137c7871d7/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
||||||
golang.org/x/net v0.0.0-20190724013045-ca1201d0de80/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
golang.org/x/net v0.0.0-20190724013045-ca1201d0de80/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
||||||
golang.org/x/net v0.0.0-20190827160401-ba9fcec4b297/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
|
||||||
golang.org/x/net v0.0.0-20190923162816-aa69164e4478/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
|
||||||
golang.org/x/net v0.0.0-20191209160850-c0dbc17a3553/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
golang.org/x/net v0.0.0-20191209160850-c0dbc17a3553/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
||||||
golang.org/x/net v0.0.0-20200114155413-6afb5195e5aa/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
golang.org/x/net v0.0.0-20200114155413-6afb5195e5aa/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
||||||
golang.org/x/net v0.0.0-20200202094626-16171245cfb2/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
golang.org/x/net v0.0.0-20200202094626-16171245cfb2/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
|
||||||
|
@ -732,10 +634,7 @@ golang.org/x/net v0.0.0-20210428140749-89ef3d95e781/go.mod h1:OJAsFXCWl8Ukc7SiCT
|
||||||
golang.org/x/net v0.0.0-20210503060351-7fd8e65b6420/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
|
golang.org/x/net v0.0.0-20210503060351-7fd8e65b6420/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
|
||||||
golang.org/x/net v0.0.0-20210525063256-abc453219eb5/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
|
golang.org/x/net v0.0.0-20210525063256-abc453219eb5/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
|
||||||
golang.org/x/net v0.0.0-20210726213435-c6fcb2dbf985/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
|
golang.org/x/net v0.0.0-20210726213435-c6fcb2dbf985/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
|
||||||
golang.org/x/net v0.0.0-20210917221730-978cfadd31cf/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
|
|
||||||
golang.org/x/net v0.0.0-20211112202133-69e39bad7dc2/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
|
golang.org/x/net v0.0.0-20211112202133-69e39bad7dc2/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
|
||||||
golang.org/x/net v0.0.0-20211209124913-491a49abca63/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
|
|
||||||
golang.org/x/net v0.0.0-20211216030914-fe4d6282115f/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
|
|
||||||
golang.org/x/net v0.0.0-20220127200216-cd36cc0744dd/go.mod h1:CfG3xpIq0wQ8r1q4Su4UZFWDARRcnwPjda9FqA0JpMk=
|
golang.org/x/net v0.0.0-20220127200216-cd36cc0744dd/go.mod h1:CfG3xpIq0wQ8r1q4Su4UZFWDARRcnwPjda9FqA0JpMk=
|
||||||
golang.org/x/net v0.0.0-20220225172249-27dd8689420f/go.mod h1:CfG3xpIq0wQ8r1q4Su4UZFWDARRcnwPjda9FqA0JpMk=
|
golang.org/x/net v0.0.0-20220225172249-27dd8689420f/go.mod h1:CfG3xpIq0wQ8r1q4Su4UZFWDARRcnwPjda9FqA0JpMk=
|
||||||
golang.org/x/net v0.0.0-20220325170049-de3da57026de/go.mod h1:CfG3xpIq0wQ8r1q4Su4UZFWDARRcnwPjda9FqA0JpMk=
|
golang.org/x/net v0.0.0-20220325170049-de3da57026de/go.mod h1:CfG3xpIq0wQ8r1q4Su4UZFWDARRcnwPjda9FqA0JpMk=
|
||||||
|
@ -744,8 +643,8 @@ golang.org/x/net v0.0.0-20220425223048-2871e0cb64e4/go.mod h1:CfG3xpIq0wQ8r1q4Su
|
||||||
golang.org/x/net v0.0.0-20220607020251-c690dde0001d/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c=
|
golang.org/x/net v0.0.0-20220607020251-c690dde0001d/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c=
|
||||||
golang.org/x/net v0.0.0-20220624214902-1bab6f366d9e/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c=
|
golang.org/x/net v0.0.0-20220624214902-1bab6f366d9e/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c=
|
||||||
golang.org/x/net v0.0.0-20220826154423-83b083e8dc8b/go.mod h1:YDH+HFinaLZZlnHAfSS6ZXJJ9M9t4Dl22yv3iI2vPwk=
|
golang.org/x/net v0.0.0-20220826154423-83b083e8dc8b/go.mod h1:YDH+HFinaLZZlnHAfSS6ZXJJ9M9t4Dl22yv3iI2vPwk=
|
||||||
golang.org/x/net v0.2.0 h1:sZfSu1wtKLGlWI4ZZayP0ck9Y73K1ynO6gqzTdBVdPU=
|
golang.org/x/net v0.9.0 h1:aWJ/m6xSmxWBx+V0XRHTlrYrPG56jKsLdTFmsSsCzOM=
|
||||||
golang.org/x/net v0.2.0/go.mod h1:KqCZLdyyvdV855qA2rE3GC2aiw5xGR5TEjj8smXukLY=
|
golang.org/x/net v0.9.0/go.mod h1:d48xBJpPfHeWQsugry2m+kC02ZBRGRgulfHnEXEuWns=
|
||||||
golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
|
golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
|
||||||
golang.org/x/oauth2 v0.0.0-20181017192945-9dcd33a902f4/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
|
golang.org/x/oauth2 v0.0.0-20181017192945-9dcd33a902f4/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
|
||||||
golang.org/x/oauth2 v0.0.0-20181203162652-d668ce993890/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
|
golang.org/x/oauth2 v0.0.0-20181203162652-d668ce993890/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
|
||||||
|
@ -768,8 +667,9 @@ golang.org/x/oauth2 v0.0.0-20220223155221-ee480838109b/go.mod h1:DAh4E804XQdzx2j
|
||||||
golang.org/x/oauth2 v0.0.0-20220309155454-6242fa91716a/go.mod h1:DAh4E804XQdzx2j+YRIaUnCqCV2RuMz24cGBJ5QYIrc=
|
golang.org/x/oauth2 v0.0.0-20220309155454-6242fa91716a/go.mod h1:DAh4E804XQdzx2j+YRIaUnCqCV2RuMz24cGBJ5QYIrc=
|
||||||
golang.org/x/oauth2 v0.0.0-20220411215720-9780585627b5/go.mod h1:DAh4E804XQdzx2j+YRIaUnCqCV2RuMz24cGBJ5QYIrc=
|
golang.org/x/oauth2 v0.0.0-20220411215720-9780585627b5/go.mod h1:DAh4E804XQdzx2j+YRIaUnCqCV2RuMz24cGBJ5QYIrc=
|
||||||
golang.org/x/oauth2 v0.0.0-20220608161450-d0670ef3b1eb/go.mod h1:jaDAt6Dkxork7LmZnYtzbRWj0W47D86a3TGe0YHBvmE=
|
golang.org/x/oauth2 v0.0.0-20220608161450-d0670ef3b1eb/go.mod h1:jaDAt6Dkxork7LmZnYtzbRWj0W47D86a3TGe0YHBvmE=
|
||||||
golang.org/x/oauth2 v0.0.0-20220822191816-0ebed06d0094 h1:2o1E+E8TpNLklK9nHiPiK1uzIYrIHt+cQx3ynCwq9V8=
|
|
||||||
golang.org/x/oauth2 v0.0.0-20220822191816-0ebed06d0094/go.mod h1:h4gKUeWbJ4rQPri7E0u6Gs4e9Ri2zaLxzw5DI5XGrYg=
|
golang.org/x/oauth2 v0.0.0-20220822191816-0ebed06d0094/go.mod h1:h4gKUeWbJ4rQPri7E0u6Gs4e9Ri2zaLxzw5DI5XGrYg=
|
||||||
|
golang.org/x/oauth2 v0.4.0 h1:NF0gk8LVPg1Ml7SSbGyySuoxdsXitj7TvgvuRxIMc/M=
|
||||||
|
golang.org/x/oauth2 v0.4.0/go.mod h1:RznEsdpjGAINPTOF0UH/t+xJ75L18YO3Ho6Pyn+uRec=
|
||||||
golang.org/x/perf v0.0.0-20180704124530-6e6d33e29852/go.mod h1:JLpeXjPJfIyPr5TlbXLkXWLhP8nz10XfvxElABhCtcw=
|
golang.org/x/perf v0.0.0-20180704124530-6e6d33e29852/go.mod h1:JLpeXjPJfIyPr5TlbXLkXWLhP8nz10XfvxElABhCtcw=
|
||||||
golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
||||||
golang.org/x/sync v0.0.0-20181108010431-42b317875d0f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
golang.org/x/sync v0.0.0-20181108010431-42b317875d0f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
||||||
|
@ -801,13 +701,10 @@ golang.org/x/sys v0.0.0-20190606165138-5da285871e9c/go.mod h1:h1NjWce9XRLGQEsW7w
|
||||||
golang.org/x/sys v0.0.0-20190624142023-c5567b49c5d0/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20190624142023-c5567b49c5d0/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
golang.org/x/sys v0.0.0-20190726091711-fc99dfbffb4e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20190726091711-fc99dfbffb4e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
golang.org/x/sys v0.0.0-20190904154756-749cb33beabd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20190904154756-749cb33beabd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
golang.org/x/sys v0.0.0-20190924154521-2837fb4f24fe/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20191001151750-bb3f8db39f24/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20191001151750-bb3f8db39f24/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
golang.org/x/sys v0.0.0-20191005200804-aed5e4c7ecf9/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20191005200804-aed5e4c7ecf9/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
golang.org/x/sys v0.0.0-20191026070338-33540a1f6037/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20191120155948-bd437916bb0e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20191120155948-bd437916bb0e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
golang.org/x/sys v0.0.0-20191204072324-ce4227a45e2e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20191204072324-ce4227a45e2e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
golang.org/x/sys v0.0.0-20191224085550-c709ea063b76/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20191228213918-04cbcbbfeed8/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20191228213918-04cbcbbfeed8/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
golang.org/x/sys v0.0.0-20200106162015-b016eb3dc98e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20200106162015-b016eb3dc98e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
golang.org/x/sys v0.0.0-20200113162924-86b910548bc1/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20200113162924-86b910548bc1/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
|
@ -840,7 +737,6 @@ golang.org/x/sys v0.0.0-20210305230114-8fe3ee5dd75b/go.mod h1:h1NjWce9XRLGQEsW7w
|
||||||
golang.org/x/sys v0.0.0-20210315160823-c6e025ad8005/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20210315160823-c6e025ad8005/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
golang.org/x/sys v0.0.0-20210320140829-1e4c9ba3b0c4/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20210320140829-1e4c9ba3b0c4/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
golang.org/x/sys v0.0.0-20210330210617-4fbd30eecc44/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20210330210617-4fbd30eecc44/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
golang.org/x/sys v0.0.0-20210403161142-5e06dd20ab57/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
|
||||||
golang.org/x/sys v0.0.0-20210423082822-04245dca01da/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20210423082822-04245dca01da/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
golang.org/x/sys v0.0.0-20210423185535-09eb48e85fd7/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20210423185535-09eb48e85fd7/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
golang.org/x/sys v0.0.0-20210510120138-977fb7262007/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20210510120138-977fb7262007/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
|
@ -852,7 +748,6 @@ golang.org/x/sys v0.0.0-20210616094352-59db8d763f22/go.mod h1:oPkhp1MJrh7nUepCBc
|
||||||
golang.org/x/sys v0.0.0-20210630005230-0f9fa26af87c/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20210630005230-0f9fa26af87c/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.0.0-20210806184541-e5e7981a1069/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20210806184541-e5e7981a1069/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.0.0-20210823070655-63515b42dcdf/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20210823070655-63515b42dcdf/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.0.0-20210831042530-f4d43177bf5e/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
|
||||||
golang.org/x/sys v0.0.0-20210908233432-aa78b53d3365/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20210908233432-aa78b53d3365/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.0.0-20211124211545-fe61309f8881/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20211124211545-fe61309f8881/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.0.0-20211210111614-af8b64212486/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20211210111614-af8b64212486/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
|
@ -869,13 +764,13 @@ golang.org/x/sys v0.0.0-20220520151302-bc2c85ada10a/go.mod h1:oPkhp1MJrh7nUepCBc
|
||||||
golang.org/x/sys v0.0.0-20220610221304-9f5ed59c137d/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20220610221304-9f5ed59c137d/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.0.0-20220728004956-3c1f35247d10/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20220728004956-3c1f35247d10/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.0.0-20220808155132-1c4a2a72c664/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20220808155132-1c4a2a72c664/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.2.0 h1:ljd4t30dBnAvMZaQCevtY0xLLD0A+bRZXbgLMLU1F/A=
|
golang.org/x/sys v0.0.0-20220811171246-fbc7d0a398ab/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.2.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.7.0 h1:3jlCCIQZPdOYu1h8BkNvLz8Kgwtae2cagcG/VamtZRU=
|
||||||
|
golang.org/x/sys v0.7.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
|
golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
|
||||||
golang.org/x/term v0.0.0-20210615171337-6886f2dfbf5b/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
|
|
||||||
golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
|
golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
|
||||||
golang.org/x/term v0.2.0 h1:z85xZCsEl7bi/KwbNADeBYoOP0++7W1ipu+aGnpwzRM=
|
golang.org/x/term v0.7.0 h1:BEvjmm5fURWqcfbSKTdpkDXYBrUS1c0m8agp14W48vQ=
|
||||||
golang.org/x/term v0.2.0/go.mod h1:TVmDHMZPmdnySmBfhjOoOdhjzdE1h4u1VwSiw2l1Nuc=
|
golang.org/x/term v0.7.0/go.mod h1:P32HKFT3hSsZrRxla30E9HqToFYAQPCMs/zFMBUFqPY=
|
||||||
golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
|
golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
|
||||||
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
|
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
|
||||||
golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
|
golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
|
||||||
|
@ -885,13 +780,12 @@ golang.org/x/text v0.3.4/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
|
||||||
golang.org/x/text v0.3.5/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
|
golang.org/x/text v0.3.5/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
|
||||||
golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
|
golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
|
||||||
golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ=
|
golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ=
|
||||||
golang.org/x/text v0.4.0 h1:BrVqGRd7+k1DiOgtnFvAkoQEWQvBc25ouMJM6429SFg=
|
golang.org/x/text v0.9.0 h1:2sjJmO8cDvYveuX97RDLsxlyUxLl+GHoLxBiRdHllBE=
|
||||||
golang.org/x/text v0.4.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8=
|
golang.org/x/text v0.9.0/go.mod h1:e1OnstbJyHTd6l/uOt8jFFHp6TRDWZR/bV3emEE/zU8=
|
||||||
golang.org/x/time v0.0.0-20180412165947-fbb02b2291d2/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
|
golang.org/x/time v0.0.0-20180412165947-fbb02b2291d2/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
|
||||||
golang.org/x/time v0.0.0-20181108054448-85acf8d2951c/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
|
golang.org/x/time v0.0.0-20181108054448-85acf8d2951c/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
|
||||||
golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
|
golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
|
||||||
golang.org/x/time v0.0.0-20191024005414-555d28b269f0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
|
golang.org/x/time v0.0.0-20191024005414-555d28b269f0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
|
||||||
golang.org/x/time v0.0.0-20210723032227-1f47c861a9ac/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
|
|
||||||
golang.org/x/tools v0.0.0-20180828015842-6cd1fcedba52/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
|
golang.org/x/tools v0.0.0-20180828015842-6cd1fcedba52/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
|
||||||
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
|
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
|
||||||
golang.org/x/tools v0.0.0-20181030000716-a0a13e073c7b/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
|
golang.org/x/tools v0.0.0-20181030000716-a0a13e073c7b/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
|
||||||
|
@ -915,7 +809,6 @@ golang.org/x/tools v0.0.0-20191115202509-3a792d9c32b2/go.mod h1:b+2E5dAYhXwXZwtn
|
||||||
golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
|
golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
|
||||||
golang.org/x/tools v0.0.0-20191125144606-a911d9008d1f/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
|
golang.org/x/tools v0.0.0-20191125144606-a911d9008d1f/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
|
||||||
golang.org/x/tools v0.0.0-20191130070609-6e064ea0cf2d/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
|
golang.org/x/tools v0.0.0-20191130070609-6e064ea0cf2d/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
|
||||||
golang.org/x/tools v0.0.0-20191216052735-49a3e744a425/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
|
|
||||||
golang.org/x/tools v0.0.0-20191216173652-a0e659d51361/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
|
golang.org/x/tools v0.0.0-20191216173652-a0e659d51361/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
|
||||||
golang.org/x/tools v0.0.0-20191227053925-7b8e75db28f4/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
|
golang.org/x/tools v0.0.0-20191227053925-7b8e75db28f4/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
|
||||||
golang.org/x/tools v0.0.0-20200117161641-43d50277825c/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
|
golang.org/x/tools v0.0.0-20200117161641-43d50277825c/go.mod h1:TB2adYChydJhpapKDTa4BR/hXlZSLoq2Wpct/0txZ28=
|
||||||
|
@ -930,11 +823,9 @@ golang.org/x/tools v0.0.0-20200304193943-95d2e580d8eb/go.mod h1:o4KQGtdN14AW+yjs
|
||||||
golang.org/x/tools v0.0.0-20200312045724-11d5b4c81c7d/go.mod h1:o4KQGtdN14AW+yjsvvwRTJJuXz8XRtIHtEnmAXLyFUw=
|
golang.org/x/tools v0.0.0-20200312045724-11d5b4c81c7d/go.mod h1:o4KQGtdN14AW+yjsvvwRTJJuXz8XRtIHtEnmAXLyFUw=
|
||||||
golang.org/x/tools v0.0.0-20200331025713-a30bf2db82d4/go.mod h1:Sl4aGygMT6LrqrWclx+PTx3U+LnKx/seiNR+3G19Ar8=
|
golang.org/x/tools v0.0.0-20200331025713-a30bf2db82d4/go.mod h1:Sl4aGygMT6LrqrWclx+PTx3U+LnKx/seiNR+3G19Ar8=
|
||||||
golang.org/x/tools v0.0.0-20200501065659-ab2804fb9c9d/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
|
golang.org/x/tools v0.0.0-20200501065659-ab2804fb9c9d/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
|
||||||
golang.org/x/tools v0.0.0-20200505023115-26f46d2f7ef8/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
|
|
||||||
golang.org/x/tools v0.0.0-20200512131952-2bc93b1c0c88/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
|
golang.org/x/tools v0.0.0-20200512131952-2bc93b1c0c88/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
|
||||||
golang.org/x/tools v0.0.0-20200515010526-7d3b6ebf133d/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
|
golang.org/x/tools v0.0.0-20200515010526-7d3b6ebf133d/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
|
||||||
golang.org/x/tools v0.0.0-20200618134242-20370b0cb4b2/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
|
golang.org/x/tools v0.0.0-20200618134242-20370b0cb4b2/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
|
||||||
golang.org/x/tools v0.0.0-20200619180055-7c47624df98f/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
|
|
||||||
golang.org/x/tools v0.0.0-20200729194436-6467de6f59a7/go.mod h1:njjCfa9FT2d7l9Bc6FUM5FLjQPp3cFF28FI3qnDFljA=
|
golang.org/x/tools v0.0.0-20200729194436-6467de6f59a7/go.mod h1:njjCfa9FT2d7l9Bc6FUM5FLjQPp3cFF28FI3qnDFljA=
|
||||||
golang.org/x/tools v0.0.0-20200804011535-6c149bb5ef0d/go.mod h1:njjCfa9FT2d7l9Bc6FUM5FLjQPp3cFF28FI3qnDFljA=
|
golang.org/x/tools v0.0.0-20200804011535-6c149bb5ef0d/go.mod h1:njjCfa9FT2d7l9Bc6FUM5FLjQPp3cFF28FI3qnDFljA=
|
||||||
golang.org/x/tools v0.0.0-20200825202427-b303f430e36d/go.mod h1:njjCfa9FT2d7l9Bc6FUM5FLjQPp3cFF28FI3qnDFljA=
|
golang.org/x/tools v0.0.0-20200825202427-b303f430e36d/go.mod h1:njjCfa9FT2d7l9Bc6FUM5FLjQPp3cFF28FI3qnDFljA=
|
||||||
|
@ -944,7 +835,6 @@ golang.org/x/tools v0.0.0-20201201161351-ac6f37ff4c2a/go.mod h1:emZCQorbCU4vsT4f
|
||||||
golang.org/x/tools v0.0.0-20201208233053-a543418bbed2/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
|
golang.org/x/tools v0.0.0-20201208233053-a543418bbed2/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
|
||||||
golang.org/x/tools v0.0.0-20201224043029-2b0845dc783e/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
|
golang.org/x/tools v0.0.0-20201224043029-2b0845dc783e/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
|
||||||
golang.org/x/tools v0.0.0-20210105154028-b0ab187a4818/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
|
golang.org/x/tools v0.0.0-20210105154028-b0ab187a4818/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
|
||||||
golang.org/x/tools v0.0.0-20210106214847-113979e3529a/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
|
|
||||||
golang.org/x/tools v0.1.0/go.mod h1:xkSsbof2nBLbhDlRMhhhyNLN/zl3eTqcnHD5viDpcZ0=
|
golang.org/x/tools v0.1.0/go.mod h1:xkSsbof2nBLbhDlRMhhhyNLN/zl3eTqcnHD5viDpcZ0=
|
||||||
golang.org/x/tools v0.1.1/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk=
|
golang.org/x/tools v0.1.1/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk=
|
||||||
golang.org/x/tools v0.1.2/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk=
|
golang.org/x/tools v0.1.2/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk=
|
||||||
|
@ -952,8 +842,8 @@ golang.org/x/tools v0.1.3/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk=
|
||||||
golang.org/x/tools v0.1.4/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk=
|
golang.org/x/tools v0.1.4/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk=
|
||||||
golang.org/x/tools v0.1.5/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk=
|
golang.org/x/tools v0.1.5/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk=
|
||||||
golang.org/x/tools v0.1.6-0.20210726203631-07bc1bf47fb2/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk=
|
golang.org/x/tools v0.1.6-0.20210726203631-07bc1bf47fb2/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk=
|
||||||
golang.org/x/tools v0.1.12 h1:VveCTK38A2rkS8ZqFY25HIDFscX5X9OoEhJd3quQmXU=
|
golang.org/x/tools v0.6.0 h1:BOw41kyTf3PuCW1pVQf8+Cyg8pMlkYB1oo9iJ6D/lKM=
|
||||||
golang.org/x/tools v0.1.12/go.mod h1:hNGJHUnrk76NpqgfD5Aqm5Crs+Hm0VOH/i9J2+nxYbc=
|
golang.org/x/tools v0.6.0/go.mod h1:Xwgl3UAJ/d3gWutnCtw505GrjyAbvKui8lOU390QaIU=
|
||||||
golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
||||||
golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
||||||
golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
|
||||||
|
@ -995,7 +885,6 @@ google.golang.org/api v0.56.0/go.mod h1:38yMfeP1kfjsl8isn0tliTjIb1rJXcQi4UXlbqiv
|
||||||
google.golang.org/api v0.57.0/go.mod h1:dVPlbZyBo2/OjBpmvNdpn2GRm6rPy75jyU7bmhdrMgI=
|
google.golang.org/api v0.57.0/go.mod h1:dVPlbZyBo2/OjBpmvNdpn2GRm6rPy75jyU7bmhdrMgI=
|
||||||
google.golang.org/api v0.61.0/go.mod h1:xQRti5UdCmoCEqFxcz93fTl338AVqDgyaDRuOZ3hg9I=
|
google.golang.org/api v0.61.0/go.mod h1:xQRti5UdCmoCEqFxcz93fTl338AVqDgyaDRuOZ3hg9I=
|
||||||
google.golang.org/api v0.63.0/go.mod h1:gs4ij2ffTRXwuzzgJl/56BdwJaA194ijkfn++9tDuPo=
|
google.golang.org/api v0.63.0/go.mod h1:gs4ij2ffTRXwuzzgJl/56BdwJaA194ijkfn++9tDuPo=
|
||||||
google.golang.org/api v0.64.0/go.mod h1:931CdxA8Rm4t6zqTFGSsgwbAEZ2+GMYurbndwSimebM=
|
|
||||||
google.golang.org/api v0.67.0/go.mod h1:ShHKP8E60yPsKNw/w8w+VYaj9H6buA5UqDp8dhbQZ6g=
|
google.golang.org/api v0.67.0/go.mod h1:ShHKP8E60yPsKNw/w8w+VYaj9H6buA5UqDp8dhbQZ6g=
|
||||||
google.golang.org/api v0.70.0/go.mod h1:Bs4ZM2HGifEvXwd50TtW70ovgJffJYw2oRCOFU/SkfA=
|
google.golang.org/api v0.70.0/go.mod h1:Bs4ZM2HGifEvXwd50TtW70ovgJffJYw2oRCOFU/SkfA=
|
||||||
google.golang.org/api v0.71.0/go.mod h1:4PyU6e6JogV1f9eA4voyrTY2batOLdgZ5qZ5HOCc4j8=
|
google.golang.org/api v0.71.0/go.mod h1:4PyU6e6JogV1f9eA4voyrTY2batOLdgZ5qZ5HOCc4j8=
|
||||||
|
@ -1049,7 +938,6 @@ google.golang.org/genproto v0.0.0-20200729003335-053ba62fc06f/go.mod h1:FWY/as6D
|
||||||
google.golang.org/genproto v0.0.0-20200804131852-c06518451d9c/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
|
google.golang.org/genproto v0.0.0-20200804131852-c06518451d9c/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
|
||||||
google.golang.org/genproto v0.0.0-20200825200019-8632dd797987/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
|
google.golang.org/genproto v0.0.0-20200825200019-8632dd797987/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
|
||||||
google.golang.org/genproto v0.0.0-20200904004341-0bd0a958aa1d/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
|
google.golang.org/genproto v0.0.0-20200904004341-0bd0a958aa1d/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
|
||||||
google.golang.org/genproto v0.0.0-20201019141844-1ed22bb0c154/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
|
|
||||||
google.golang.org/genproto v0.0.0-20201109203340-2640f1f9cdfb/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
|
google.golang.org/genproto v0.0.0-20201109203340-2640f1f9cdfb/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
|
||||||
google.golang.org/genproto v0.0.0-20201201144952-b05cb90ed32e/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
|
google.golang.org/genproto v0.0.0-20201201144952-b05cb90ed32e/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
|
||||||
google.golang.org/genproto v0.0.0-20201210142538-e3217bee35cc/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
|
google.golang.org/genproto v0.0.0-20201210142538-e3217bee35cc/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no=
|
||||||
|
@ -1080,7 +968,6 @@ google.golang.org/genproto v0.0.0-20211118181313-81c1377c94b1/go.mod h1:5CzLGKJ6
|
||||||
google.golang.org/genproto v0.0.0-20211206160659-862468c7d6e0/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc=
|
google.golang.org/genproto v0.0.0-20211206160659-862468c7d6e0/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc=
|
||||||
google.golang.org/genproto v0.0.0-20211208223120-3a66f561d7aa/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc=
|
google.golang.org/genproto v0.0.0-20211208223120-3a66f561d7aa/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc=
|
||||||
google.golang.org/genproto v0.0.0-20211221195035-429b39de9b1c/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc=
|
google.golang.org/genproto v0.0.0-20211221195035-429b39de9b1c/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc=
|
||||||
google.golang.org/genproto v0.0.0-20211223182754-3ac035c7e7cb/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc=
|
|
||||||
google.golang.org/genproto v0.0.0-20220126215142-9970aeb2e350/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc=
|
google.golang.org/genproto v0.0.0-20220126215142-9970aeb2e350/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc=
|
||||||
google.golang.org/genproto v0.0.0-20220207164111-0872dc986b00/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc=
|
google.golang.org/genproto v0.0.0-20220207164111-0872dc986b00/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc=
|
||||||
google.golang.org/genproto v0.0.0-20220218161850-94dd64e39d7c/go.mod h1:kGP+zUP2Ddo0ayMi4YuN7C3WZyJvGLZRh8Z5wnAqvEI=
|
google.golang.org/genproto v0.0.0-20220218161850-94dd64e39d7c/go.mod h1:kGP+zUP2Ddo0ayMi4YuN7C3WZyJvGLZRh8Z5wnAqvEI=
|
||||||
|
@ -1097,16 +984,15 @@ google.golang.org/genproto v0.0.0-20220505152158-f39f71e6c8f3/go.mod h1:RAyBrSAP
|
||||||
google.golang.org/genproto v0.0.0-20220518221133-4f43b3371335/go.mod h1:RAyBrSAP7Fh3Nc84ghnVLDPuV51xc9agzmm4Ph6i0Q4=
|
google.golang.org/genproto v0.0.0-20220518221133-4f43b3371335/go.mod h1:RAyBrSAP7Fh3Nc84ghnVLDPuV51xc9agzmm4Ph6i0Q4=
|
||||||
google.golang.org/genproto v0.0.0-20220523171625-347a074981d8/go.mod h1:RAyBrSAP7Fh3Nc84ghnVLDPuV51xc9agzmm4Ph6i0Q4=
|
google.golang.org/genproto v0.0.0-20220523171625-347a074981d8/go.mod h1:RAyBrSAP7Fh3Nc84ghnVLDPuV51xc9agzmm4Ph6i0Q4=
|
||||||
google.golang.org/genproto v0.0.0-20220608133413-ed9918b62aac/go.mod h1:KEWEmljWE5zPzLBa/oHl6DaEt9LmfH6WtH1OHIvleBA=
|
google.golang.org/genproto v0.0.0-20220608133413-ed9918b62aac/go.mod h1:KEWEmljWE5zPzLBa/oHl6DaEt9LmfH6WtH1OHIvleBA=
|
||||||
google.golang.org/genproto v0.0.0-20220616135557-88e70c0c3a90 h1:4SPz2GL2CXJt28MTF8V6Ap/9ZiVbQlJeGSd9qtA7DLs=
|
|
||||||
google.golang.org/genproto v0.0.0-20220616135557-88e70c0c3a90/go.mod h1:KEWEmljWE5zPzLBa/oHl6DaEt9LmfH6WtH1OHIvleBA=
|
google.golang.org/genproto v0.0.0-20220616135557-88e70c0c3a90/go.mod h1:KEWEmljWE5zPzLBa/oHl6DaEt9LmfH6WtH1OHIvleBA=
|
||||||
|
google.golang.org/genproto v0.0.0-20221202195650-67e5cbc046fd h1:OjndDrsik+Gt+e6fs45z9AxiewiKyLKYpA45W5Kpkks=
|
||||||
|
google.golang.org/genproto v0.0.0-20221202195650-67e5cbc046fd/go.mod h1:cTsE614GARnxrLsqKREzmNYJACSWWpAWdNMwnD7c2BE=
|
||||||
google.golang.org/grpc v1.14.0/go.mod h1:yo6s7OP7yaDglbqo1J04qKzAhqBH6lvTonzMVmEdcZw=
|
google.golang.org/grpc v1.14.0/go.mod h1:yo6s7OP7yaDglbqo1J04qKzAhqBH6lvTonzMVmEdcZw=
|
||||||
google.golang.org/grpc v1.16.0/go.mod h1:0JHn/cJsOMiMfNA9+DeHDlAU7KAAB5GDlYFpa9MZMio=
|
google.golang.org/grpc v1.16.0/go.mod h1:0JHn/cJsOMiMfNA9+DeHDlAU7KAAB5GDlYFpa9MZMio=
|
||||||
google.golang.org/grpc v1.17.0/go.mod h1:6QZJwpn2B+Zp71q/5VxRsJ6NXXVCE5NRUHRo+f3cWCs=
|
google.golang.org/grpc v1.17.0/go.mod h1:6QZJwpn2B+Zp71q/5VxRsJ6NXXVCE5NRUHRo+f3cWCs=
|
||||||
google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c=
|
google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c=
|
||||||
google.golang.org/grpc v1.20.0/go.mod h1:chYK+tFQF0nDUGJgXMSgLCQk3phJEuONr2DCgLDdAQM=
|
|
||||||
google.golang.org/grpc v1.20.1/go.mod h1:10oTOabMzJvdu6/UiuZezV6QK5dSlG84ov/aaiqXj38=
|
google.golang.org/grpc v1.20.1/go.mod h1:10oTOabMzJvdu6/UiuZezV6QK5dSlG84ov/aaiqXj38=
|
||||||
google.golang.org/grpc v1.21.1/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM=
|
google.golang.org/grpc v1.21.1/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM=
|
||||||
google.golang.org/grpc v1.22.1/go.mod h1:Y5yQAOtifL1yxbo5wqy6BxZv8vAUGQwXBOALyacEbxg=
|
|
||||||
google.golang.org/grpc v1.23.0/go.mod h1:Y5yQAOtifL1yxbo5wqy6BxZv8vAUGQwXBOALyacEbxg=
|
google.golang.org/grpc v1.23.0/go.mod h1:Y5yQAOtifL1yxbo5wqy6BxZv8vAUGQwXBOALyacEbxg=
|
||||||
google.golang.org/grpc v1.25.1/go.mod h1:c3i+UQWmh7LiEpx4sFZnkU36qjEYZ0imhYfXVyQciAY=
|
google.golang.org/grpc v1.25.1/go.mod h1:c3i+UQWmh7LiEpx4sFZnkU36qjEYZ0imhYfXVyQciAY=
|
||||||
google.golang.org/grpc v1.26.0/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk=
|
google.golang.org/grpc v1.26.0/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk=
|
||||||
|
@ -1130,15 +1016,14 @@ google.golang.org/grpc v1.39.0/go.mod h1:PImNr+rS9TWYb2O4/emRugxiyHZ5JyHW5F+RPnD
|
||||||
google.golang.org/grpc v1.39.1/go.mod h1:PImNr+rS9TWYb2O4/emRugxiyHZ5JyHW5F+RPnDzfrE=
|
google.golang.org/grpc v1.39.1/go.mod h1:PImNr+rS9TWYb2O4/emRugxiyHZ5JyHW5F+RPnDzfrE=
|
||||||
google.golang.org/grpc v1.40.0/go.mod h1:ogyxbiOoUXAkP+4+xa6PZSE9DZgIHtSpzjDTB9KAK34=
|
google.golang.org/grpc v1.40.0/go.mod h1:ogyxbiOoUXAkP+4+xa6PZSE9DZgIHtSpzjDTB9KAK34=
|
||||||
google.golang.org/grpc v1.40.1/go.mod h1:ogyxbiOoUXAkP+4+xa6PZSE9DZgIHtSpzjDTB9KAK34=
|
google.golang.org/grpc v1.40.1/go.mod h1:ogyxbiOoUXAkP+4+xa6PZSE9DZgIHtSpzjDTB9KAK34=
|
||||||
google.golang.org/grpc v1.41.0/go.mod h1:U3l9uK9J0sini8mHphKoXyaqDA/8VyGnDee1zzIUK6k=
|
|
||||||
google.golang.org/grpc v1.42.0/go.mod h1:k+4IHHFw41K8+bbowsex27ge2rCb65oeWqe4jJ590SU=
|
google.golang.org/grpc v1.42.0/go.mod h1:k+4IHHFw41K8+bbowsex27ge2rCb65oeWqe4jJ590SU=
|
||||||
google.golang.org/grpc v1.43.0/go.mod h1:k+4IHHFw41K8+bbowsex27ge2rCb65oeWqe4jJ590SU=
|
|
||||||
google.golang.org/grpc v1.44.0/go.mod h1:k+4IHHFw41K8+bbowsex27ge2rCb65oeWqe4jJ590SU=
|
google.golang.org/grpc v1.44.0/go.mod h1:k+4IHHFw41K8+bbowsex27ge2rCb65oeWqe4jJ590SU=
|
||||||
google.golang.org/grpc v1.45.0/go.mod h1:lN7owxKUQEqMfSyQikvvk5tf/6zMPsrK+ONuO11+0rQ=
|
google.golang.org/grpc v1.45.0/go.mod h1:lN7owxKUQEqMfSyQikvvk5tf/6zMPsrK+ONuO11+0rQ=
|
||||||
google.golang.org/grpc v1.46.0/go.mod h1:vN9eftEi1UMyUsIF80+uQXhHjbXYbm0uXoFCACuMGWk=
|
google.golang.org/grpc v1.46.0/go.mod h1:vN9eftEi1UMyUsIF80+uQXhHjbXYbm0uXoFCACuMGWk=
|
||||||
google.golang.org/grpc v1.46.2/go.mod h1:vN9eftEi1UMyUsIF80+uQXhHjbXYbm0uXoFCACuMGWk=
|
google.golang.org/grpc v1.46.2/go.mod h1:vN9eftEi1UMyUsIF80+uQXhHjbXYbm0uXoFCACuMGWk=
|
||||||
google.golang.org/grpc v1.47.0 h1:9n77onPX5F3qfFCqjy9dhn8PbNQsIKeVU04J9G7umt8=
|
|
||||||
google.golang.org/grpc v1.47.0/go.mod h1:vN9eftEi1UMyUsIF80+uQXhHjbXYbm0uXoFCACuMGWk=
|
google.golang.org/grpc v1.47.0/go.mod h1:vN9eftEi1UMyUsIF80+uQXhHjbXYbm0uXoFCACuMGWk=
|
||||||
|
google.golang.org/grpc v1.51.0 h1:E1eGv1FTqoLIdnBCZufiSHgKjlqG6fKFf6pPWtMTh8U=
|
||||||
|
google.golang.org/grpc v1.51.0/go.mod h1:wgNDFcnuBGmxLKI/qn4T+m5BtEBYXJPvibbUPsAIPww=
|
||||||
google.golang.org/grpc/cmd/protoc-gen-go-grpc v1.1.0/go.mod h1:6Kw0yEErY5E/yWrBtf03jp27GLLJujG4z/JK95pnjjw=
|
google.golang.org/grpc/cmd/protoc-gen-go-grpc v1.1.0/go.mod h1:6Kw0yEErY5E/yWrBtf03jp27GLLJujG4z/JK95pnjjw=
|
||||||
google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8=
|
google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8=
|
||||||
google.golang.org/protobuf v0.0.0-20200221191635-4d8936d0db64/go.mod h1:kwYJMbMJ01Woi6D6+Kah6886xMZcty6N08ah7+eCXa0=
|
google.golang.org/protobuf v0.0.0-20200221191635-4d8936d0db64/go.mod h1:kwYJMbMJ01Woi6D6+Kah6886xMZcty6N08ah7+eCXa0=
|
||||||
|
@ -1153,14 +1038,13 @@ google.golang.org/protobuf v1.25.0/go.mod h1:9JNX74DMeImyA3h4bdi1ymwjUzf21/xIlba
|
||||||
google.golang.org/protobuf v1.26.0-rc.1/go.mod h1:jlhhOSvTdKEhbULTjvd4ARK9grFBp09yW+WbY/TyQbw=
|
google.golang.org/protobuf v1.26.0-rc.1/go.mod h1:jlhhOSvTdKEhbULTjvd4ARK9grFBp09yW+WbY/TyQbw=
|
||||||
google.golang.org/protobuf v1.26.0/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQnmE0givc=
|
google.golang.org/protobuf v1.26.0/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQnmE0givc=
|
||||||
google.golang.org/protobuf v1.27.1/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQnmE0givc=
|
google.golang.org/protobuf v1.27.1/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQnmE0givc=
|
||||||
google.golang.org/protobuf v1.28.0 h1:w43yiav+6bVFTBQFZX0r7ipe9JQ1QsbMgHwbBziscLw=
|
|
||||||
google.golang.org/protobuf v1.28.0/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I=
|
google.golang.org/protobuf v1.28.0/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I=
|
||||||
gopkg.in/DataDog/dd-trace-go.v1 v1.34.0/go.mod h1:HtrC65fyJ6lWazShCC9rlOeiTSZJ0XtZhkwjZM2WpC4=
|
google.golang.org/protobuf v1.28.1 h1:d0NfwRgPtno5B1Wa6L2DAG+KivqkdutMf1UhdNx175w=
|
||||||
|
google.golang.org/protobuf v1.28.1/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I=
|
||||||
gopkg.in/alecthomas/kingpin.v2 v2.2.6/go.mod h1:FMv+mEhP44yOT+4EoQTLFTRgOQ1FBLkstjWtayDeSgw=
|
gopkg.in/alecthomas/kingpin.v2 v2.2.6/go.mod h1:FMv+mEhP44yOT+4EoQTLFTRgOQ1FBLkstjWtayDeSgw=
|
||||||
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
||||||
gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
||||||
gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
||||||
gopkg.in/check.v1 v1.0.0-20200227125254-8fa46927fb4f/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
|
||||||
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c h1:Hei/4ADfdWqJk1ZMxUNpqntNwaWcugrBjAiHlqqRiVk=
|
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c h1:Hei/4ADfdWqJk1ZMxUNpqntNwaWcugrBjAiHlqqRiVk=
|
||||||
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c/go.mod h1:JHkPIbrfpd72SG/EVd6muEfDQjcINNoR0C8j2r3qZ4Q=
|
gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c/go.mod h1:JHkPIbrfpd72SG/EVd6muEfDQjcINNoR0C8j2r3qZ4Q=
|
||||||
gopkg.in/coreos/go-oidc.v2 v2.2.1 h1:MY5SZClJ7vhjKfr64a4nHAOV/c3WH2gB9BMrR64J1Mc=
|
gopkg.in/coreos/go-oidc.v2 v2.2.1 h1:MY5SZClJ7vhjKfr64a4nHAOV/c3WH2gB9BMrR64J1Mc=
|
||||||
|
@ -1194,24 +1078,11 @@ honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWh
|
||||||
honnef.co/go/tools v0.0.1-2019.2.3/go.mod h1:a3bituU0lyd329TUQxRnasdCoJDkEUEAqEt0JzvZhAg=
|
honnef.co/go/tools v0.0.1-2019.2.3/go.mod h1:a3bituU0lyd329TUQxRnasdCoJDkEUEAqEt0JzvZhAg=
|
||||||
honnef.co/go/tools v0.0.1-2020.1.3/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
|
honnef.co/go/tools v0.0.1-2020.1.3/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
|
||||||
honnef.co/go/tools v0.0.1-2020.1.4/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
|
honnef.co/go/tools v0.0.1-2020.1.4/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
|
||||||
k8s.io/api v0.23.1/go.mod h1:WfXnOnwSqNtG62Y1CdjoMxh7r7u9QXGCkA1u0na2jgo=
|
nhooyr.io/websocket v1.8.7 h1:usjR2uOr/zjjkVMy0lW+PPohFok7PCow5sDjLgX4P4g=
|
||||||
k8s.io/apimachinery v0.23.1/go.mod h1:SADt2Kl8/sttJ62RRsi9MIV4o8f5S3coArm0Iu3fBno=
|
nhooyr.io/websocket v1.8.7/go.mod h1:B70DZP8IakI65RVQ51MsWP/8jndNma26DVA/nFSCgW0=
|
||||||
k8s.io/client-go v0.23.1/go.mod h1:6QSI8fEuqD4zgFK0xbdwfB/PthBsIxCJMa3s17WlcO0=
|
|
||||||
k8s.io/gengo v0.0.0-20210813121822-485abfe95c7c/go.mod h1:FiNAH4ZV3gBg2Kwh89tzAEV2be7d5xI0vBa/VySYy3E=
|
|
||||||
k8s.io/klog/v2 v2.0.0/go.mod h1:PBfzABfn139FHAV07az/IF9Wp1bkk3vpT2XSJ76fSDE=
|
|
||||||
k8s.io/klog/v2 v2.2.0/go.mod h1:Od+F08eJP+W3HUb4pSrPpgp9DGU4GzlpG/TmITuYh/Y=
|
|
||||||
k8s.io/klog/v2 v2.30.0/go.mod h1:y1WjHnz7Dj687irZUWR/WLkLc5N1YHtjLdmgWjndZn0=
|
|
||||||
k8s.io/klog/v2 v2.40.1/go.mod h1:y1WjHnz7Dj687irZUWR/WLkLc5N1YHtjLdmgWjndZn0=
|
|
||||||
k8s.io/kube-openapi v0.0.0-20211115234752-e816edb12b65/go.mod h1:sX9MT8g7NVZM5lVL/j8QyCCJe8YSMW30QvGZWaCIDIk=
|
|
||||||
k8s.io/utils v0.0.0-20210802155522-efc7438f0176/go.mod h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA=
|
|
||||||
k8s.io/utils v0.0.0-20210930125809-cb0fa318a74b/go.mod h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA=
|
|
||||||
rsc.io/binaryregexp v0.2.0/go.mod h1:qTv7/COck+e2FymRvadv62gMdZztPaShugOCi3I+8D8=
|
rsc.io/binaryregexp v0.2.0/go.mod h1:qTv7/COck+e2FymRvadv62gMdZztPaShugOCi3I+8D8=
|
||||||
rsc.io/quote/v3 v3.1.0/go.mod h1:yEA65RcK8LyAZtP9Kv3t0HmxON59tX3rD+tICJqUlj0=
|
rsc.io/quote/v3 v3.1.0/go.mod h1:yEA65RcK8LyAZtP9Kv3t0HmxON59tX3rD+tICJqUlj0=
|
||||||
rsc.io/sampler v1.3.0/go.mod h1:T1hPZKmBbMNahiBKFy5HrXp6adAjACjK9JXDnKaTXpA=
|
rsc.io/sampler v1.3.0/go.mod h1:T1hPZKmBbMNahiBKFy5HrXp6adAjACjK9JXDnKaTXpA=
|
||||||
sigs.k8s.io/json v0.0.0-20211020170558-c049b76a60c6/go.mod h1:p4QtZmO4uMYipTQNzagwnNoseA6OxSUutVw05NhYDRs=
|
|
||||||
sigs.k8s.io/structured-merge-diff/v4 v4.0.2/go.mod h1:bJZC9H9iH24zzfZ/41RGcq60oK1F7G282QMXDPYydCw=
|
|
||||||
sigs.k8s.io/structured-merge-diff/v4 v4.1.2/go.mod h1:j/nl6xW8vLS49O8YvXW1ocPhZawJtm+Yrr7PPRQ0Vg4=
|
|
||||||
sigs.k8s.io/yaml v1.2.0/go.mod h1:yfXDCHCao9+ENCvLSE62v9VSji2MKu5jeNfTrofGhJc=
|
|
||||||
sourcegraph.com/sourcegraph/go-diff v0.5.0/go.mod h1:kuch7UrkMzY0X+p9CRK03kfuPQ2zzQcaEFbx8wA8rck=
|
sourcegraph.com/sourcegraph/go-diff v0.5.0/go.mod h1:kuch7UrkMzY0X+p9CRK03kfuPQ2zzQcaEFbx8wA8rck=
|
||||||
sourcegraph.com/sqs/pbtypes v0.0.0-20180604144634-d3ebe8f20ae4/go.mod h1:ketZ/q3QxT9HOBeFhu6RdvsftgpsbFHBF5Cas6cDKZ0=
|
sourcegraph.com/sqs/pbtypes v0.0.0-20180604144634-d3ebe8f20ae4/go.mod h1:ketZ/q3QxT9HOBeFhu6RdvsftgpsbFHBF5Cas6cDKZ0=
|
||||||
zombiezen.com/go/capnproto2 v2.18.0+incompatible h1:mwfXZniffG5mXokQGHUJWGnqIBggoPfT/CEwon9Yess=
|
zombiezen.com/go/capnproto2 v2.18.0+incompatible h1:mwfXZniffG5mXokQGHUJWGnqIBggoPfT/CEwon9Yess=
|
||||||
|
|
|
@ -113,7 +113,7 @@ func (rc *RemoteConfig) UnmarshalJSON(b []byte) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func originRequestFromSingeRule(c *cli.Context) OriginRequestConfig {
|
func originRequestFromSingleRule(c *cli.Context) OriginRequestConfig {
|
||||||
var connectTimeout = defaultHTTPConnectTimeout
|
var connectTimeout = defaultHTTPConnectTimeout
|
||||||
var tlsTimeout = defaultTLSTimeout
|
var tlsTimeout = defaultTLSTimeout
|
||||||
var tcpKeepAlive = defaultTCPKeepAlive
|
var tcpKeepAlive = defaultTCPKeepAlive
|
||||||
|
|
|
@ -411,7 +411,7 @@ func TestDefaultConfigFromCLI(t *testing.T) {
|
||||||
KeepAliveTimeout: defaultKeepAliveTimeout,
|
KeepAliveTimeout: defaultKeepAliveTimeout,
|
||||||
ProxyAddress: defaultProxyAddress,
|
ProxyAddress: defaultProxyAddress,
|
||||||
}
|
}
|
||||||
actual := originRequestFromSingeRule(c)
|
actual := originRequestFromSingleRule(c)
|
||||||
require.Equal(t, expected, actual)
|
require.Equal(t, expected, actual)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -20,6 +20,7 @@ import (
|
||||||
|
|
||||||
var (
|
var (
|
||||||
ErrNoIngressRules = errors.New("The config file doesn't contain any ingress rules")
|
ErrNoIngressRules = errors.New("The config file doesn't contain any ingress rules")
|
||||||
|
ErrNoIngressRulesCLI = errors.New("No ingress rules were defined in provided config (if any) nor from the cli, cloudflared will return 503 for all incoming HTTP requests")
|
||||||
errLastRuleNotCatchAll = errors.New("The last ingress rule must match all URLs (i.e. it should not have a hostname or path filter)")
|
errLastRuleNotCatchAll = errors.New("The last ingress rule must match all URLs (i.e. it should not have a hostname or path filter)")
|
||||||
errBadWildcard = errors.New("Hostname patterns can have at most one wildcard character (\"*\") and it can only be used for subdomains, e.g. \"*.example.com\"")
|
errBadWildcard = errors.New("Hostname patterns can have at most one wildcard character (\"*\") and it can only be used for subdomains, e.g. \"*.example.com\"")
|
||||||
errHostnameContainsPort = errors.New("Hostname cannot contain a port")
|
errHostnameContainsPort = errors.New("Hostname cannot contain a port")
|
||||||
|
@ -34,13 +35,22 @@ const (
|
||||||
|
|
||||||
// FindMatchingRule returns the index of the Ingress Rule which matches the given
|
// FindMatchingRule returns the index of the Ingress Rule which matches the given
|
||||||
// hostname and path. This function assumes the last rule matches everything,
|
// hostname and path. This function assumes the last rule matches everything,
|
||||||
// which is the case if the rules were instantiated via the ingress#Validate method
|
// which is the case if the rules were instantiated via the ingress#Validate method.
|
||||||
|
//
|
||||||
|
// Negative index rule signifies local cloudflared rules (not-user defined).
|
||||||
func (ing Ingress) FindMatchingRule(hostname, path string) (*Rule, int) {
|
func (ing Ingress) FindMatchingRule(hostname, path string) (*Rule, int) {
|
||||||
// The hostname might contain port. We only want to compare the host part with the rule
|
// The hostname might contain port. We only want to compare the host part with the rule
|
||||||
host, _, err := net.SplitHostPort(hostname)
|
host, _, err := net.SplitHostPort(hostname)
|
||||||
if err == nil {
|
if err == nil {
|
||||||
hostname = host
|
hostname = host
|
||||||
}
|
}
|
||||||
|
for i, rule := range ing.LocalRules {
|
||||||
|
if rule.Matches(hostname, path) {
|
||||||
|
// Local rule matches return a negative rule index to distiguish local rules from user-defined rules in logs
|
||||||
|
// Full range would be [-1 .. )
|
||||||
|
return &rule, -1 - i
|
||||||
|
}
|
||||||
|
}
|
||||||
for i, rule := range ing.Rules {
|
for i, rule := range ing.Rules {
|
||||||
if rule.Matches(hostname, path) {
|
if rule.Matches(hostname, path) {
|
||||||
return &rule, i
|
return &rule, i
|
||||||
|
@ -58,7 +68,7 @@ func matchHost(ruleHost, reqHost string) bool {
|
||||||
|
|
||||||
// Validate hostnames that use wildcards at the start
|
// Validate hostnames that use wildcards at the start
|
||||||
if strings.HasPrefix(ruleHost, "*.") {
|
if strings.HasPrefix(ruleHost, "*.") {
|
||||||
toMatch := strings.TrimPrefix(ruleHost, "*.")
|
toMatch := strings.TrimPrefix(ruleHost, "*")
|
||||||
return strings.HasSuffix(reqHost, toMatch)
|
return strings.HasSuffix(reqHost, toMatch)
|
||||||
}
|
}
|
||||||
return false
|
return false
|
||||||
|
@ -66,21 +76,63 @@ func matchHost(ruleHost, reqHost string) bool {
|
||||||
|
|
||||||
// Ingress maps eyeball requests to origins.
|
// Ingress maps eyeball requests to origins.
|
||||||
type Ingress struct {
|
type Ingress struct {
|
||||||
|
// Set of ingress rules that are not added to remote config, e.g. management
|
||||||
|
LocalRules []Rule
|
||||||
|
// Rules that are provided by the user from remote or local configuration
|
||||||
Rules []Rule `json:"ingress"`
|
Rules []Rule `json:"ingress"`
|
||||||
Defaults OriginRequestConfig `json:"originRequest"`
|
Defaults OriginRequestConfig `json:"originRequest"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewSingleOrigin constructs an Ingress set with only one rule, constructed from
|
// ParseIngress parses ingress rules, but does not send HTTP requests to the origins.
|
||||||
// legacy CLI parameters like --url or --no-chunked-encoding.
|
func ParseIngress(conf *config.Configuration) (Ingress, error) {
|
||||||
func NewSingleOrigin(c *cli.Context, allowURLFromArgs bool) (Ingress, error) {
|
if len(conf.Ingress) == 0 {
|
||||||
|
return Ingress{}, ErrNoIngressRules
|
||||||
|
}
|
||||||
|
return validateIngress(conf.Ingress, originRequestFromConfig(conf.OriginRequest))
|
||||||
|
}
|
||||||
|
|
||||||
|
// ParseIngressFromConfigAndCLI will parse the configuration rules from config files for ingress
|
||||||
|
// rules and then attempt to parse CLI for ingress rules.
|
||||||
|
// Will always return at least one valid ingress rule. If none are provided by the user, the default
|
||||||
|
// will be to return 503 status code for all incoming requests.
|
||||||
|
func ParseIngressFromConfigAndCLI(conf *config.Configuration, c *cli.Context, log *zerolog.Logger) (Ingress, error) {
|
||||||
|
// Attempt to parse ingress rules from configuration
|
||||||
|
ingressRules, err := ParseIngress(conf)
|
||||||
|
if err == nil && !ingressRules.IsEmpty() {
|
||||||
|
return ingressRules, nil
|
||||||
|
}
|
||||||
|
if err != ErrNoIngressRules {
|
||||||
|
return Ingress{}, err
|
||||||
|
}
|
||||||
|
// Attempt to parse ingress rules from CLI:
|
||||||
|
// --url or --unix-socket flag for a tunnel HTTP ingress
|
||||||
|
// --hello-world for a basic HTTP ingress self-served
|
||||||
|
// --bastion for ssh bastion service
|
||||||
|
ingressRules, err = parseCLIIngress(c, false)
|
||||||
|
if errors.Is(err, ErrNoIngressRulesCLI) {
|
||||||
|
// Only log a warning if the tunnel is not a remotely managed tunnel and the config
|
||||||
|
// will be loaded after connecting.
|
||||||
|
if !c.IsSet("token") {
|
||||||
|
log.Warn().Msgf(ErrNoIngressRulesCLI.Error())
|
||||||
|
}
|
||||||
|
return newDefaultOrigin(c, log), nil
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return Ingress{}, err
|
||||||
|
}
|
||||||
|
return ingressRules, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// parseCLIIngress constructs an Ingress set with only one rule constructed from
|
||||||
|
// CLI parameters: --url, --hello-world, --bastion, or --unix-socket
|
||||||
|
func parseCLIIngress(c *cli.Context, allowURLFromArgs bool) (Ingress, error) {
|
||||||
service, err := parseSingleOriginService(c, allowURLFromArgs)
|
service, err := parseSingleOriginService(c, allowURLFromArgs)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return Ingress{}, err
|
return Ingress{}, err
|
||||||
}
|
}
|
||||||
|
|
||||||
// Construct an Ingress with the single rule.
|
// Construct an Ingress with the single rule.
|
||||||
defaults := originRequestFromSingeRule(c)
|
defaults := originRequestFromSingleRule(c)
|
||||||
ing := Ingress{
|
ing := Ingress{
|
||||||
Rules: []Rule{
|
Rules: []Rule{
|
||||||
{
|
{
|
||||||
|
@ -93,27 +145,25 @@ func NewSingleOrigin(c *cli.Context, allowURLFromArgs bool) (Ingress, error) {
|
||||||
return ing, err
|
return ing, err
|
||||||
}
|
}
|
||||||
|
|
||||||
// WarpRoutingService starts a tcp stream between the origin and requests from
|
// newDefaultOrigin always returns a 503 response code to help indicate that there are no ingress
|
||||||
// warp clients.
|
// rules setup, but the tunnel is reachable.
|
||||||
type WarpRoutingService struct {
|
func newDefaultOrigin(c *cli.Context, log *zerolog.Logger) Ingress {
|
||||||
Proxy StreamBasedOriginProxy
|
noRulesService := newDefaultStatusCode(log)
|
||||||
}
|
defaults := originRequestFromSingleRule(c)
|
||||||
|
ingress := Ingress{
|
||||||
func NewWarpRoutingService(config WarpRoutingConfig) *WarpRoutingService {
|
Rules: []Rule{
|
||||||
svc := &rawTCPService{
|
{
|
||||||
name: ServiceWarpRouting,
|
Service: &noRulesService,
|
||||||
dialer: net.Dialer{
|
},
|
||||||
Timeout: config.ConnectTimeout.Duration,
|
|
||||||
KeepAlive: config.TCPKeepAlive.Duration,
|
|
||||||
},
|
},
|
||||||
|
Defaults: defaults,
|
||||||
}
|
}
|
||||||
|
return ingress
|
||||||
return &WarpRoutingService{Proxy: svc}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Get a single origin service from the CLI/config.
|
// Get a single origin service from the CLI/config.
|
||||||
func parseSingleOriginService(c *cli.Context, allowURLFromArgs bool) (OriginService, error) {
|
func parseSingleOriginService(c *cli.Context, allowURLFromArgs bool) (OriginService, error) {
|
||||||
if c.IsSet("hello-world") {
|
if c.IsSet(HelloWorldFlag) {
|
||||||
return new(helloWorld), nil
|
return new(helloWorld), nil
|
||||||
}
|
}
|
||||||
if c.IsSet(config.BastionFlag) {
|
if c.IsSet(config.BastionFlag) {
|
||||||
|
@ -138,8 +188,7 @@ func parseSingleOriginService(c *cli.Context, allowURLFromArgs bool) (OriginServ
|
||||||
}
|
}
|
||||||
return &unixSocketPath{path: path, scheme: "http"}, nil
|
return &unixSocketPath{path: path, scheme: "http"}, nil
|
||||||
}
|
}
|
||||||
u, err := url.Parse("http://localhost:8080")
|
return nil, ErrNoIngressRulesCLI
|
||||||
return &httpService{url: u}, err
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// IsEmpty checks if there are any ingress rules.
|
// IsEmpty checks if there are any ingress rules.
|
||||||
|
@ -207,7 +256,7 @@ func validateIngress(ingress []config.UnvalidatedIngressRule, defaults OriginReq
|
||||||
}
|
}
|
||||||
srv := newStatusCode(statusCode)
|
srv := newStatusCode(statusCode)
|
||||||
service = &srv
|
service = &srv
|
||||||
} else if r.Service == HelloWorldService || r.Service == "hello-world" || r.Service == "helloworld" {
|
} else if r.Service == HelloWorldFlag || r.Service == HelloWorldService {
|
||||||
service = new(helloWorld)
|
service = new(helloWorld)
|
||||||
} else if r.Service == ServiceSocksProxy {
|
} else if r.Service == ServiceSocksProxy {
|
||||||
rules := make([]ipaccess.Rule, len(r.OriginRequest.IPRules))
|
rules := make([]ipaccess.Rule, len(r.OriginRequest.IPRules))
|
||||||
|
@ -336,14 +385,6 @@ func (e errRuleShouldNotBeCatchAll) Error() string {
|
||||||
"will never be triggered.", e.index+1, e.hostname)
|
"will never be triggered.", e.index+1, e.hostname)
|
||||||
}
|
}
|
||||||
|
|
||||||
// ParseIngress parses ingress rules, but does not send HTTP requests to the origins.
|
|
||||||
func ParseIngress(conf *config.Configuration) (Ingress, error) {
|
|
||||||
if len(conf.Ingress) == 0 {
|
|
||||||
return Ingress{}, ErrNoIngressRules
|
|
||||||
}
|
|
||||||
return validateIngress(conf.Ingress, originRequestFromConfig(conf.OriginRequest))
|
|
||||||
}
|
|
||||||
|
|
||||||
func isHTTPService(url *url.URL) bool {
|
func isHTTPService(url *url.URL) bool {
|
||||||
return url.Scheme == "http" || url.Scheme == "https" || url.Scheme == "ws" || url.Scheme == "wss"
|
return url.Scheme == "http" || url.Scheme == "https" || url.Scheme == "ws" || url.Scheme == "wss"
|
||||||
}
|
}
|
||||||
|
|
|
@ -43,7 +43,7 @@ ingress:
|
||||||
require.Equal(t, "https", s.scheme)
|
require.Equal(t, "https", s.scheme)
|
||||||
}
|
}
|
||||||
|
|
||||||
func Test_parseIngress(t *testing.T) {
|
func TestParseIngress(t *testing.T) {
|
||||||
localhost8000 := MustParseURL(t, "https://localhost:8000")
|
localhost8000 := MustParseURL(t, "https://localhost:8000")
|
||||||
localhost8001 := MustParseURL(t, "https://localhost:8001")
|
localhost8001 := MustParseURL(t, "https://localhost:8001")
|
||||||
fourOhFour := newStatusCode(404)
|
fourOhFour := newStatusCode(404)
|
||||||
|
@ -517,7 +517,7 @@ func TestSingleOriginSetsConfig(t *testing.T) {
|
||||||
|
|
||||||
allowURLFromArgs := false
|
allowURLFromArgs := false
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
ingress, err := NewSingleOrigin(cliCtx, allowURLFromArgs)
|
ingress, err := parseCLIIngress(cliCtx, allowURLFromArgs)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
assert.Equal(t, config.CustomDuration{Duration: time.Second}, ingress.Rules[0].Config.ConnectTimeout)
|
assert.Equal(t, config.CustomDuration{Duration: time.Second}, ingress.Rules[0].Config.ConnectTimeout)
|
||||||
|
@ -537,6 +537,119 @@ func TestSingleOriginSetsConfig(t *testing.T) {
|
||||||
assert.Equal(t, socksProxy, ingress.Rules[0].Config.ProxyType)
|
assert.Equal(t, socksProxy, ingress.Rules[0].Config.ProxyType)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestSingleOriginServices(t *testing.T) {
|
||||||
|
host := "://localhost:8080"
|
||||||
|
httpURL := urlMustParse("http" + host)
|
||||||
|
tcpURL := urlMustParse("tcp" + host)
|
||||||
|
unix := "unix://service"
|
||||||
|
newCli := func(params ...string) *cli.Context {
|
||||||
|
flagSet := flag.NewFlagSet(t.Name(), flag.PanicOnError)
|
||||||
|
flagSet.Bool("hello-world", false, "")
|
||||||
|
flagSet.Bool("bastion", false, "")
|
||||||
|
flagSet.String("url", "", "")
|
||||||
|
flagSet.String("unix-socket", "", "")
|
||||||
|
cliCtx := cli.NewContext(cli.NewApp(), flagSet, nil)
|
||||||
|
for i := 0; i < len(params); i += 2 {
|
||||||
|
cliCtx.Set(params[i], params[i+1])
|
||||||
|
}
|
||||||
|
|
||||||
|
return cliCtx
|
||||||
|
}
|
||||||
|
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
cli *cli.Context
|
||||||
|
expectedService OriginService
|
||||||
|
err error
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "Valid hello-world",
|
||||||
|
cli: newCli("hello-world", "true"),
|
||||||
|
expectedService: &helloWorld{},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Valid bastion",
|
||||||
|
cli: newCli("bastion", "true"),
|
||||||
|
expectedService: newBastionService(),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Valid http url",
|
||||||
|
cli: newCli("url", httpURL.String()),
|
||||||
|
expectedService: &httpService{url: httpURL},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Valid tcp url",
|
||||||
|
cli: newCli("url", tcpURL.String()),
|
||||||
|
expectedService: newTCPOverWSService(tcpURL),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Valid unix-socket",
|
||||||
|
cli: newCli("unix-socket", unix),
|
||||||
|
expectedService: &unixSocketPath{path: unix, scheme: "http"},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "No origins defined",
|
||||||
|
cli: newCli(),
|
||||||
|
err: ErrNoIngressRulesCLI,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, test := range tests {
|
||||||
|
t.Run(test.name, func(t *testing.T) {
|
||||||
|
ingress, err := parseCLIIngress(test.cli, false)
|
||||||
|
require.Equal(t, err, test.err)
|
||||||
|
if test.err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
require.Equal(t, 1, len(ingress.Rules))
|
||||||
|
rule := ingress.Rules[0]
|
||||||
|
require.Equal(t, test.expectedService, rule.Service)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func urlMustParse(s string) *url.URL {
|
||||||
|
u, err := url.Parse(s)
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
return u
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestSingleOriginServices_URL(t *testing.T) {
|
||||||
|
host := "://localhost:8080"
|
||||||
|
newCli := func(param string, value string) *cli.Context {
|
||||||
|
flagSet := flag.NewFlagSet(t.Name(), flag.PanicOnError)
|
||||||
|
flagSet.String("url", "", "")
|
||||||
|
cliCtx := cli.NewContext(cli.NewApp(), flagSet, nil)
|
||||||
|
cliCtx.Set(param, value)
|
||||||
|
return cliCtx
|
||||||
|
}
|
||||||
|
|
||||||
|
httpTests := []string{"http", "https"}
|
||||||
|
for _, test := range httpTests {
|
||||||
|
t.Run(test, func(t *testing.T) {
|
||||||
|
url := urlMustParse(test + host)
|
||||||
|
ingress, err := parseCLIIngress(newCli("url", url.String()), false)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Equal(t, 1, len(ingress.Rules))
|
||||||
|
rule := ingress.Rules[0]
|
||||||
|
require.Equal(t, &httpService{url: url}, rule.Service)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
tcpTests := []string{"ssh", "rdp", "smb", "tcp"}
|
||||||
|
for _, test := range tcpTests {
|
||||||
|
t.Run(test, func(t *testing.T) {
|
||||||
|
url := urlMustParse(test + host)
|
||||||
|
ingress, err := parseCLIIngress(newCli("url", url.String()), false)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Equal(t, 1, len(ingress.Rules))
|
||||||
|
rule := ingress.Rules[0]
|
||||||
|
require.Equal(t, newTCPOverWSService(url), rule.Service)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func TestFindMatchingRule(t *testing.T) {
|
func TestFindMatchingRule(t *testing.T) {
|
||||||
ingress := Ingress{
|
ingress := Ingress{
|
||||||
Rules: []Rule{
|
Rules: []Rule{
|
||||||
|
|
|
@ -9,6 +9,7 @@ import (
|
||||||
|
|
||||||
"github.com/cloudflare/cloudflared/ipaccess"
|
"github.com/cloudflare/cloudflared/ipaccess"
|
||||||
"github.com/cloudflare/cloudflared/socks"
|
"github.com/cloudflare/cloudflared/socks"
|
||||||
|
"github.com/cloudflare/cloudflared/stream"
|
||||||
"github.com/cloudflare/cloudflared/websocket"
|
"github.com/cloudflare/cloudflared/websocket"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -25,7 +26,7 @@ type streamHandlerFunc func(originConn io.ReadWriter, remoteConn net.Conn, log *
|
||||||
// DefaultStreamHandler is an implementation of streamHandlerFunc that
|
// DefaultStreamHandler is an implementation of streamHandlerFunc that
|
||||||
// performs a two way io.Copy between originConn and remoteConn.
|
// performs a two way io.Copy between originConn and remoteConn.
|
||||||
func DefaultStreamHandler(originConn io.ReadWriter, remoteConn net.Conn, log *zerolog.Logger) {
|
func DefaultStreamHandler(originConn io.ReadWriter, remoteConn net.Conn, log *zerolog.Logger) {
|
||||||
websocket.Stream(originConn, remoteConn, log)
|
stream.Pipe(originConn, remoteConn, log)
|
||||||
}
|
}
|
||||||
|
|
||||||
// tcpConnection is an OriginConnection that directly streams to raw TCP.
|
// tcpConnection is an OriginConnection that directly streams to raw TCP.
|
||||||
|
@ -34,7 +35,7 @@ type tcpConnection struct {
|
||||||
}
|
}
|
||||||
|
|
||||||
func (tc *tcpConnection) Stream(ctx context.Context, tunnelConn io.ReadWriter, log *zerolog.Logger) {
|
func (tc *tcpConnection) Stream(ctx context.Context, tunnelConn io.ReadWriter, log *zerolog.Logger) {
|
||||||
websocket.Stream(tunnelConn, tc.conn, log)
|
stream.Pipe(tunnelConn, tc.conn, log)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (tc *tcpConnection) Close() {
|
func (tc *tcpConnection) Close() {
|
||||||
|
|
|
@ -22,6 +22,7 @@ import (
|
||||||
|
|
||||||
"github.com/cloudflare/cloudflared/logger"
|
"github.com/cloudflare/cloudflared/logger"
|
||||||
"github.com/cloudflare/cloudflared/socks"
|
"github.com/cloudflare/cloudflared/socks"
|
||||||
|
"github.com/cloudflare/cloudflared/stream"
|
||||||
"github.com/cloudflare/cloudflared/websocket"
|
"github.com/cloudflare/cloudflared/websocket"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -50,6 +51,7 @@ func TestStreamTCPConnection(t *testing.T) {
|
||||||
errGroup, ctx := errgroup.WithContext(ctx)
|
errGroup, ctx := errgroup.WithContext(ctx)
|
||||||
errGroup.Go(func() error {
|
errGroup.Go(func() error {
|
||||||
_, err := eyeballConn.Write(testMessage)
|
_, err := eyeballConn.Write(testMessage)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
readBuffer := make([]byte, len(testResponse))
|
readBuffer := make([]byte, len(testResponse))
|
||||||
_, err = eyeballConn.Read(readBuffer)
|
_, err = eyeballConn.Read(readBuffer)
|
||||||
|
@ -158,7 +160,7 @@ func TestSocksStreamWSOverTCPConnection(t *testing.T) {
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
defer wsForwarderInConn.Close()
|
defer wsForwarderInConn.Close()
|
||||||
|
|
||||||
websocket.Stream(wsForwarderInConn, &wsEyeball{wsForwarderOutConn}, testLogger)
|
stream.Pipe(wsForwarderInConn, &wsEyeball{wsForwarderOutConn}, testLogger)
|
||||||
return nil
|
return nil
|
||||||
})
|
})
|
||||||
|
|
||||||
|
|
|
@ -17,6 +17,12 @@ type StreamBasedOriginProxy interface {
|
||||||
EstablishConnection(ctx context.Context, dest string) (OriginConnection, error)
|
EstablishConnection(ctx context.Context, dest string) (OriginConnection, error)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// HTTPLocalProxy can be implemented by cloudflared services that want to handle incoming http requests.
|
||||||
|
type HTTPLocalProxy interface {
|
||||||
|
// Handler is how cloudflared proxies eyeball requests to the local cloudflared services
|
||||||
|
http.Handler
|
||||||
|
}
|
||||||
|
|
||||||
func (o *unixSocketPath) RoundTrip(req *http.Request) (*http.Response, error) {
|
func (o *unixSocketPath) RoundTrip(req *http.Request) (*http.Response, error) {
|
||||||
req.URL.Scheme = o.scheme
|
req.URL.Scheme = o.scheme
|
||||||
return o.transport.RoundTrip(req)
|
return o.transport.RoundTrip(req)
|
||||||
|
@ -44,6 +50,9 @@ func (o *httpService) RoundTrip(req *http.Request) (*http.Response, error) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func (o *statusCode) RoundTrip(_ *http.Request) (*http.Response, error) {
|
func (o *statusCode) RoundTrip(_ *http.Request) (*http.Response, error) {
|
||||||
|
if o.defaultResp {
|
||||||
|
o.log.Warn().Msgf(ErrNoIngressRulesCLI.Error())
|
||||||
|
}
|
||||||
resp := &http.Response{
|
resp := &http.Response{
|
||||||
StatusCode: o.code,
|
StatusCode: o.code,
|
||||||
Status: fmt.Sprintf("%d %s", o.code, http.StatusText(o.code)),
|
Status: fmt.Sprintf("%d %s", o.code, http.StatusText(o.code)),
|
||||||
|
|
|
@ -17,12 +17,14 @@ import (
|
||||||
|
|
||||||
"github.com/cloudflare/cloudflared/hello"
|
"github.com/cloudflare/cloudflared/hello"
|
||||||
"github.com/cloudflare/cloudflared/ipaccess"
|
"github.com/cloudflare/cloudflared/ipaccess"
|
||||||
|
"github.com/cloudflare/cloudflared/management"
|
||||||
"github.com/cloudflare/cloudflared/socks"
|
"github.com/cloudflare/cloudflared/socks"
|
||||||
"github.com/cloudflare/cloudflared/tlsconfig"
|
"github.com/cloudflare/cloudflared/tlsconfig"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
HelloWorldService = "hello_world"
|
HelloWorldService = "hello_world"
|
||||||
|
HelloWorldFlag = "hello-world"
|
||||||
HttpStatusService = "http_status"
|
HttpStatusService = "http_status"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -246,12 +248,21 @@ func (o helloWorld) MarshalJSON() ([]byte, error) {
|
||||||
// Typical use-case is "user wants the catch-all rule to just respond 404".
|
// Typical use-case is "user wants the catch-all rule to just respond 404".
|
||||||
type statusCode struct {
|
type statusCode struct {
|
||||||
code int
|
code int
|
||||||
|
|
||||||
|
// Set only when the user has not defined any ingress rules
|
||||||
|
defaultResp bool
|
||||||
|
log *zerolog.Logger
|
||||||
}
|
}
|
||||||
|
|
||||||
func newStatusCode(status int) statusCode {
|
func newStatusCode(status int) statusCode {
|
||||||
return statusCode{code: status}
|
return statusCode{code: status}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// default status code (503) that is returned for requests to cloudflared that don't have any ingress rules setup
|
||||||
|
func newDefaultStatusCode(log *zerolog.Logger) statusCode {
|
||||||
|
return statusCode{code: 503, defaultResp: true, log: log}
|
||||||
|
}
|
||||||
|
|
||||||
func (o *statusCode) String() string {
|
func (o *statusCode) String() string {
|
||||||
return fmt.Sprintf("http_status:%d", o.code)
|
return fmt.Sprintf("http_status:%d", o.code)
|
||||||
}
|
}
|
||||||
|
@ -268,6 +279,54 @@ func (o statusCode) MarshalJSON() ([]byte, error) {
|
||||||
return json.Marshal(o.String())
|
return json.Marshal(o.String())
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// WarpRoutingService starts a tcp stream between the origin and requests from
|
||||||
|
// warp clients.
|
||||||
|
type WarpRoutingService struct {
|
||||||
|
Proxy StreamBasedOriginProxy
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewWarpRoutingService(config WarpRoutingConfig) *WarpRoutingService {
|
||||||
|
svc := &rawTCPService{
|
||||||
|
name: ServiceWarpRouting,
|
||||||
|
dialer: net.Dialer{
|
||||||
|
Timeout: config.ConnectTimeout.Duration,
|
||||||
|
KeepAlive: config.TCPKeepAlive.Duration,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return &WarpRoutingService{Proxy: svc}
|
||||||
|
}
|
||||||
|
|
||||||
|
// ManagementService starts a local HTTP server to handle incoming management requests.
|
||||||
|
type ManagementService struct {
|
||||||
|
HTTPLocalProxy
|
||||||
|
}
|
||||||
|
|
||||||
|
func newManagementService(managementProxy HTTPLocalProxy) *ManagementService {
|
||||||
|
return &ManagementService{
|
||||||
|
HTTPLocalProxy: managementProxy,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (o *ManagementService) start(log *zerolog.Logger, _ <-chan struct{}, cfg OriginRequestConfig) error {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (o *ManagementService) String() string {
|
||||||
|
return "management"
|
||||||
|
}
|
||||||
|
|
||||||
|
func (o ManagementService) MarshalJSON() ([]byte, error) {
|
||||||
|
return json.Marshal(o.String())
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewManagementRule(management *management.ManagementService) Rule {
|
||||||
|
return Rule{
|
||||||
|
Hostname: management.Hostname,
|
||||||
|
Service: newManagementService(management),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
type NopReadCloser struct{}
|
type NopReadCloser struct{}
|
||||||
|
|
||||||
// Read always returns EOF to signal end of input
|
// Read always returns EOF to signal end of input
|
||||||
|
|
|
@ -148,6 +148,16 @@ func Test_rule_matches(t *testing.T) {
|
||||||
},
|
},
|
||||||
want: true,
|
want: true,
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
name: "Hostname with wildcard should not match if no dot present",
|
||||||
|
rule: Rule{
|
||||||
|
Hostname: "*.api.abc.cloud",
|
||||||
|
},
|
||||||
|
args: args{
|
||||||
|
requestURL: MustParseURL(t, "https://testing-api.abc.cloud"),
|
||||||
|
},
|
||||||
|
want: false,
|
||||||
|
},
|
||||||
}
|
}
|
||||||
for _, tt := range tests {
|
for _, tt := range tests {
|
||||||
t.Run(tt.name, func(t *testing.T) {
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
|
|
@ -0,0 +1,66 @@
|
||||||
|
package test
|
||||||
|
|
||||||
|
// copied from https://github.com/nhooyr/websocket/blob/master/internal/test/wstest/pipe.go
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bufio"
|
||||||
|
"context"
|
||||||
|
"net"
|
||||||
|
"net/http"
|
||||||
|
"net/http/httptest"
|
||||||
|
|
||||||
|
"nhooyr.io/websocket"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Pipe is used to create an in memory connection
|
||||||
|
// between two websockets analogous to net.Pipe.
|
||||||
|
func WSPipe(dialOpts *websocket.DialOptions, acceptOpts *websocket.AcceptOptions) (clientConn, serverConn *websocket.Conn) {
|
||||||
|
tt := fakeTransport{
|
||||||
|
h: func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
serverConn, _ = websocket.Accept(w, r, acceptOpts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
if dialOpts == nil {
|
||||||
|
dialOpts = &websocket.DialOptions{}
|
||||||
|
}
|
||||||
|
dialOpts = &*dialOpts
|
||||||
|
dialOpts.HTTPClient = &http.Client{
|
||||||
|
Transport: tt,
|
||||||
|
}
|
||||||
|
|
||||||
|
clientConn, _, _ = websocket.Dial(context.Background(), "ws://example.com", dialOpts)
|
||||||
|
return clientConn, serverConn
|
||||||
|
}
|
||||||
|
|
||||||
|
type fakeTransport struct {
|
||||||
|
h http.HandlerFunc
|
||||||
|
}
|
||||||
|
|
||||||
|
func (t fakeTransport) RoundTrip(r *http.Request) (*http.Response, error) {
|
||||||
|
clientConn, serverConn := net.Pipe()
|
||||||
|
|
||||||
|
hj := testHijacker{
|
||||||
|
ResponseRecorder: httptest.NewRecorder(),
|
||||||
|
serverConn: serverConn,
|
||||||
|
}
|
||||||
|
|
||||||
|
t.h.ServeHTTP(hj, r)
|
||||||
|
|
||||||
|
resp := hj.ResponseRecorder.Result()
|
||||||
|
if resp.StatusCode == http.StatusSwitchingProtocols {
|
||||||
|
resp.Body = clientConn
|
||||||
|
}
|
||||||
|
return resp, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
type testHijacker struct {
|
||||||
|
*httptest.ResponseRecorder
|
||||||
|
serverConn net.Conn
|
||||||
|
}
|
||||||
|
|
||||||
|
var _ http.Hijacker = testHijacker{}
|
||||||
|
|
||||||
|
func (hj testHijacker) Hijack() (net.Conn, *bufio.ReadWriter, error) {
|
||||||
|
return hj.serverConn, bufio.NewReadWriter(bufio.NewReader(hj.serverConn), bufio.NewWriter(hj.serverConn)), nil
|
||||||
|
}
|
|
@ -15,6 +15,9 @@ import (
|
||||||
"github.com/urfave/cli/v2"
|
"github.com/urfave/cli/v2"
|
||||||
"golang.org/x/term"
|
"golang.org/x/term"
|
||||||
"gopkg.in/natefinch/lumberjack.v2"
|
"gopkg.in/natefinch/lumberjack.v2"
|
||||||
|
|
||||||
|
"github.com/cloudflare/cloudflared/features"
|
||||||
|
"github.com/cloudflare/cloudflared/management"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
@ -35,8 +38,19 @@ const (
|
||||||
consoleTimeFormat = time.RFC3339
|
consoleTimeFormat = time.RFC3339
|
||||||
)
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
ManagementLogger *management.Logger
|
||||||
|
)
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
|
zerolog.TimeFieldFormat = time.RFC3339
|
||||||
zerolog.TimestampFunc = utcNow
|
zerolog.TimestampFunc = utcNow
|
||||||
|
|
||||||
|
if features.Contains(features.FeatureManagementLogs) {
|
||||||
|
// Management logger needs to be initialized before any of the other loggers as to not capture
|
||||||
|
// it's own logging events.
|
||||||
|
ManagementLogger = management.NewLogger()
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func utcNow() time.Time {
|
func utcNow() time.Time {
|
||||||
|
@ -50,17 +64,36 @@ func fallbackLogger(err error) *zerolog.Logger {
|
||||||
return &failLog
|
return &failLog
|
||||||
}
|
}
|
||||||
|
|
||||||
type resilientMultiWriter struct {
|
// resilientMultiWriter is an alternative to zerolog's so that we can make it resilient to individual
|
||||||
writers []io.Writer
|
|
||||||
}
|
|
||||||
|
|
||||||
// This custom resilientMultiWriter is an alternative to zerolog's so that we can make it resilient to individual
|
|
||||||
// writer's errors. E.g., when running as a Windows service, the console writer fails, but we don't want to
|
// writer's errors. E.g., when running as a Windows service, the console writer fails, but we don't want to
|
||||||
// allow that to prevent all logging to fail due to breaking the for loop upon an error.
|
// allow that to prevent all logging to fail due to breaking the for loop upon an error.
|
||||||
|
type resilientMultiWriter struct {
|
||||||
|
level zerolog.Level
|
||||||
|
writers []io.Writer
|
||||||
|
managementWriter zerolog.LevelWriter
|
||||||
|
}
|
||||||
|
|
||||||
func (t resilientMultiWriter) Write(p []byte) (n int, err error) {
|
func (t resilientMultiWriter) Write(p []byte) (n int, err error) {
|
||||||
for _, w := range t.writers {
|
for _, w := range t.writers {
|
||||||
_, _ = w.Write(p)
|
_, _ = w.Write(p)
|
||||||
}
|
}
|
||||||
|
if t.managementWriter != nil {
|
||||||
|
_, _ = t.managementWriter.Write(p)
|
||||||
|
}
|
||||||
|
return len(p), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (t resilientMultiWriter) WriteLevel(level zerolog.Level, p []byte) (n int, err error) {
|
||||||
|
// Only write the event to normal writers if it exceeds the level, but always write to the
|
||||||
|
// management logger and let it decided with the provided level of the log event.
|
||||||
|
if t.level <= level {
|
||||||
|
for _, w := range t.writers {
|
||||||
|
_, _ = w.Write(p)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if t.managementWriter != nil {
|
||||||
|
_, _ = t.managementWriter.WriteLevel(level, p)
|
||||||
|
}
|
||||||
return len(p), nil
|
return len(p), nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -91,13 +124,18 @@ func newZerolog(loggerConfig *Config) *zerolog.Logger {
|
||||||
writers = append(writers, rollingLogger)
|
writers = append(writers, rollingLogger)
|
||||||
}
|
}
|
||||||
|
|
||||||
multi := resilientMultiWriter{writers}
|
var managementWriter zerolog.LevelWriter
|
||||||
|
if features.Contains(features.FeatureManagementLogs) {
|
||||||
|
managementWriter = ManagementLogger
|
||||||
|
}
|
||||||
|
|
||||||
level, levelErr := zerolog.ParseLevel(loggerConfig.MinLevel)
|
level, levelErr := zerolog.ParseLevel(loggerConfig.MinLevel)
|
||||||
if levelErr != nil {
|
if levelErr != nil {
|
||||||
level = zerolog.InfoLevel
|
level = zerolog.InfoLevel
|
||||||
}
|
}
|
||||||
log := zerolog.New(multi).With().Timestamp().Logger().Level(level)
|
|
||||||
|
multi := resilientMultiWriter{level, writers, managementWriter}
|
||||||
|
log := zerolog.New(multi).With().Timestamp().Logger()
|
||||||
if !levelErrorLogged && levelErr != nil {
|
if !levelErrorLogged && levelErr != nil {
|
||||||
log.Error().Msgf("Failed to parse log level %q, using %q instead", loggerConfig.MinLevel, level)
|
log.Error().Msgf("Failed to parse log level %q, using %q instead", loggerConfig.MinLevel, level)
|
||||||
levelErrorLogged = true
|
levelErrorLogged = true
|
||||||
|
|
|
@ -9,14 +9,13 @@ import (
|
||||||
"github.com/stretchr/testify/assert"
|
"github.com/stretchr/testify/assert"
|
||||||
)
|
)
|
||||||
|
|
||||||
var writeCalls int
|
|
||||||
|
|
||||||
type mockedWriter struct {
|
type mockedWriter struct {
|
||||||
wantErr bool
|
wantErr bool
|
||||||
|
writeCalls int
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c mockedWriter) Write(p []byte) (int, error) {
|
func (c *mockedWriter) Write(p []byte) (int, error) {
|
||||||
writeCalls++
|
c.writeCalls++
|
||||||
|
|
||||||
if c.wantErr {
|
if c.wantErr {
|
||||||
return -1, errors.New("Expected error")
|
return -1, errors.New("Expected error")
|
||||||
|
@ -26,65 +25,108 @@ func (c mockedWriter) Write(p []byte) (int, error) {
|
||||||
}
|
}
|
||||||
|
|
||||||
// Tests that a new writer is only used if it actually works.
|
// Tests that a new writer is only used if it actually works.
|
||||||
func TestResilientMultiWriter(t *testing.T) {
|
func TestResilientMultiWriter_Errors(t *testing.T) {
|
||||||
tests := []struct {
|
tests := []struct {
|
||||||
name string
|
name string
|
||||||
writers []io.Writer
|
writers []*mockedWriter
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "All valid writers",
|
name: "All valid writers",
|
||||||
writers: []io.Writer{
|
writers: []*mockedWriter{
|
||||||
mockedWriter{
|
{
|
||||||
wantErr: false,
|
wantErr: false,
|
||||||
},
|
},
|
||||||
mockedWriter{
|
{
|
||||||
wantErr: false,
|
wantErr: false,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "All invalid writers",
|
name: "All invalid writers",
|
||||||
writers: []io.Writer{
|
writers: []*mockedWriter{
|
||||||
mockedWriter{
|
{
|
||||||
wantErr: true,
|
wantErr: true,
|
||||||
},
|
},
|
||||||
mockedWriter{
|
{
|
||||||
wantErr: true,
|
wantErr: true,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "First invalid writer",
|
name: "First invalid writer",
|
||||||
writers: []io.Writer{
|
writers: []*mockedWriter{
|
||||||
mockedWriter{
|
{
|
||||||
wantErr: true,
|
wantErr: true,
|
||||||
},
|
},
|
||||||
mockedWriter{
|
{
|
||||||
wantErr: false,
|
wantErr: false,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "First valid writer",
|
name: "First valid writer",
|
||||||
writers: []io.Writer{
|
writers: []*mockedWriter{
|
||||||
mockedWriter{
|
{
|
||||||
wantErr: false,
|
wantErr: false,
|
||||||
},
|
},
|
||||||
mockedWriter{
|
{
|
||||||
wantErr: true,
|
wantErr: true,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, tt := range tests {
|
for _, test := range tests {
|
||||||
writers := tt.writers
|
t.Run(test.name, func(t *testing.T) {
|
||||||
multiWriter := resilientMultiWriter{writers}
|
writers := []io.Writer{}
|
||||||
|
for _, w := range test.writers {
|
||||||
|
writers = append(writers, w)
|
||||||
|
}
|
||||||
|
multiWriter := resilientMultiWriter{zerolog.InfoLevel, writers, nil}
|
||||||
|
|
||||||
logger := zerolog.New(multiWriter).With().Timestamp().Logger().Level(zerolog.InfoLevel)
|
logger := zerolog.New(multiWriter).With().Timestamp().Logger()
|
||||||
logger.Info().Msg("Test msg")
|
logger.Info().Msg("Test msg")
|
||||||
|
|
||||||
assert.Equal(t, len(writers), writeCalls)
|
for _, w := range test.writers {
|
||||||
writeCalls = 0
|
// Expect each writer to be written to regardless of the previous writers returning an error
|
||||||
|
assert.Equal(t, 1, w.writeCalls)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
type mockedManagementWriter struct {
|
||||||
|
WriteCalls int
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *mockedManagementWriter) Write(p []byte) (int, error) {
|
||||||
|
return len(p), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *mockedManagementWriter) WriteLevel(level zerolog.Level, p []byte) (int, error) {
|
||||||
|
c.WriteCalls++
|
||||||
|
return len(p), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Tests that management writer receives write calls of all levels except Disabled
|
||||||
|
func TestResilientMultiWriter_Management(t *testing.T) {
|
||||||
|
for _, level := range []zerolog.Level{
|
||||||
|
zerolog.DebugLevel,
|
||||||
|
zerolog.InfoLevel,
|
||||||
|
zerolog.WarnLevel,
|
||||||
|
zerolog.ErrorLevel,
|
||||||
|
zerolog.FatalLevel,
|
||||||
|
zerolog.PanicLevel,
|
||||||
|
} {
|
||||||
|
t.Run(level.String(), func(t *testing.T) {
|
||||||
|
managementWriter := mockedManagementWriter{}
|
||||||
|
multiWriter := resilientMultiWriter{level, []io.Writer{&mockedWriter{}}, &managementWriter}
|
||||||
|
|
||||||
|
logger := zerolog.New(multiWriter).With().Timestamp().Logger()
|
||||||
|
logger.Info().Msg("Test msg")
|
||||||
|
|
||||||
|
// Always write to management
|
||||||
|
assert.Equal(t, 1, managementWriter.WriteCalls)
|
||||||
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,317 @@
|
||||||
|
package management
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
|
||||||
|
jsoniter "github.com/json-iterator/go"
|
||||||
|
"github.com/rs/zerolog"
|
||||||
|
"nhooyr.io/websocket"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
errInvalidMessageType = fmt.Errorf("invalid message type was provided")
|
||||||
|
)
|
||||||
|
|
||||||
|
// ServerEventType represents the event types that can come from the server
|
||||||
|
type ServerEventType string
|
||||||
|
|
||||||
|
// ClientEventType represents the event types that can come from the client
|
||||||
|
type ClientEventType string
|
||||||
|
|
||||||
|
const (
|
||||||
|
UnknownClientEventType ClientEventType = ""
|
||||||
|
StartStreaming ClientEventType = "start_streaming"
|
||||||
|
StopStreaming ClientEventType = "stop_streaming"
|
||||||
|
|
||||||
|
UnknownServerEventType ServerEventType = ""
|
||||||
|
Logs ServerEventType = "logs"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ServerEvent is the base struct that informs, based of the Type field, which Event type was provided from the server.
|
||||||
|
type ServerEvent struct {
|
||||||
|
Type ServerEventType `json:"type,omitempty"`
|
||||||
|
// The raw json message is provided to allow better deserialization once the type is known
|
||||||
|
event jsoniter.RawMessage
|
||||||
|
}
|
||||||
|
|
||||||
|
// ClientEvent is the base struct that informs, based of the Type field, which Event type was provided from the client.
|
||||||
|
type ClientEvent struct {
|
||||||
|
Type ClientEventType `json:"type,omitempty"`
|
||||||
|
// The raw json message is provided to allow better deserialization once the type is known
|
||||||
|
event jsoniter.RawMessage
|
||||||
|
}
|
||||||
|
|
||||||
|
// EventStartStreaming signifies that the client wishes to start receiving log events.
|
||||||
|
// Additional filters can be provided to augment the log events requested.
|
||||||
|
type EventStartStreaming struct {
|
||||||
|
ClientEvent
|
||||||
|
Filters *StreamingFilters `json:"filters,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type StreamingFilters struct {
|
||||||
|
Events []LogEventType `json:"events,omitempty"`
|
||||||
|
Level *LogLevel `json:"level,omitempty"`
|
||||||
|
Sampling float64 `json:"sampling,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// EventStopStreaming signifies that the client wishes to halt receiving log events.
|
||||||
|
type EventStopStreaming struct {
|
||||||
|
ClientEvent
|
||||||
|
}
|
||||||
|
|
||||||
|
// EventLog is the event that the server sends to the client with the log events.
|
||||||
|
type EventLog struct {
|
||||||
|
ServerEvent
|
||||||
|
Logs []*Log `json:"logs"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// LogEventType is the way that logging messages are able to be filtered.
|
||||||
|
// Example: assigning LogEventType.Cloudflared to a zerolog event will allow the client to filter for only
|
||||||
|
// the Cloudflared-related events.
|
||||||
|
type LogEventType int8
|
||||||
|
|
||||||
|
const (
|
||||||
|
// Cloudflared events are signficant to cloudflared operations like connection state changes.
|
||||||
|
// Cloudflared is also the default event type for any events that haven't been separated into a proper event type.
|
||||||
|
Cloudflared LogEventType = iota
|
||||||
|
HTTP
|
||||||
|
TCP
|
||||||
|
UDP
|
||||||
|
)
|
||||||
|
|
||||||
|
func ParseLogEventType(s string) (LogEventType, bool) {
|
||||||
|
switch s {
|
||||||
|
case "cloudflared":
|
||||||
|
return Cloudflared, true
|
||||||
|
case "http":
|
||||||
|
return HTTP, true
|
||||||
|
case "tcp":
|
||||||
|
return TCP, true
|
||||||
|
case "udp":
|
||||||
|
return UDP, true
|
||||||
|
}
|
||||||
|
return -1, false
|
||||||
|
}
|
||||||
|
|
||||||
|
func (l LogEventType) String() string {
|
||||||
|
switch l {
|
||||||
|
case Cloudflared:
|
||||||
|
return "cloudflared"
|
||||||
|
case HTTP:
|
||||||
|
return "http"
|
||||||
|
case TCP:
|
||||||
|
return "tcp"
|
||||||
|
case UDP:
|
||||||
|
return "udp"
|
||||||
|
default:
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (l LogEventType) MarshalJSON() ([]byte, error) {
|
||||||
|
return json.Marshal(l.String())
|
||||||
|
}
|
||||||
|
|
||||||
|
func (e *LogEventType) UnmarshalJSON(data []byte) error {
|
||||||
|
var s string
|
||||||
|
if err := json.Unmarshal(data, &s); err != nil {
|
||||||
|
return errors.New("unable to unmarshal LogEventType string")
|
||||||
|
}
|
||||||
|
if event, ok := ParseLogEventType(s); ok {
|
||||||
|
*e = event
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return errors.New("unable to unmarshal LogEventType")
|
||||||
|
}
|
||||||
|
|
||||||
|
// LogLevel corresponds to the zerolog logging levels
|
||||||
|
// "panic", "fatal", and "trace" are exempt from this list as they are rarely used and, at least
|
||||||
|
// the the first two are limited to failure conditions that lead to cloudflared shutting down.
|
||||||
|
type LogLevel int8
|
||||||
|
|
||||||
|
const (
|
||||||
|
Debug LogLevel = 0
|
||||||
|
Info LogLevel = 1
|
||||||
|
Warn LogLevel = 2
|
||||||
|
Error LogLevel = 3
|
||||||
|
)
|
||||||
|
|
||||||
|
func ParseLogLevel(l string) (LogLevel, bool) {
|
||||||
|
switch l {
|
||||||
|
case "debug":
|
||||||
|
return Debug, true
|
||||||
|
case "info":
|
||||||
|
return Info, true
|
||||||
|
case "warn":
|
||||||
|
return Warn, true
|
||||||
|
case "error":
|
||||||
|
return Error, true
|
||||||
|
}
|
||||||
|
return -1, false
|
||||||
|
}
|
||||||
|
|
||||||
|
func (l LogLevel) String() string {
|
||||||
|
switch l {
|
||||||
|
case Debug:
|
||||||
|
return "debug"
|
||||||
|
case Info:
|
||||||
|
return "info"
|
||||||
|
case Warn:
|
||||||
|
return "warn"
|
||||||
|
case Error:
|
||||||
|
return "error"
|
||||||
|
default:
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (l LogLevel) MarshalJSON() ([]byte, error) {
|
||||||
|
return json.Marshal(l.String())
|
||||||
|
}
|
||||||
|
|
||||||
|
func (l *LogLevel) UnmarshalJSON(data []byte) error {
|
||||||
|
var s string
|
||||||
|
if err := json.Unmarshal(data, &s); err != nil {
|
||||||
|
return errors.New("unable to unmarshal LogLevel string")
|
||||||
|
}
|
||||||
|
if level, ok := ParseLogLevel(s); ok {
|
||||||
|
*l = level
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return fmt.Errorf("unable to unmarshal LogLevel")
|
||||||
|
}
|
||||||
|
|
||||||
|
const (
|
||||||
|
// TimeKey aligns with the zerolog.TimeFieldName
|
||||||
|
TimeKey = "time"
|
||||||
|
// LevelKey aligns with the zerolog.LevelFieldName
|
||||||
|
LevelKey = "level"
|
||||||
|
// LevelKey aligns with the zerolog.MessageFieldName
|
||||||
|
MessageKey = "message"
|
||||||
|
// EventTypeKey is the custom JSON key of the LogEventType in ZeroLogEvent
|
||||||
|
EventTypeKey = "event"
|
||||||
|
// FieldsKey is a custom JSON key to match and store every other key for a zerolog event
|
||||||
|
FieldsKey = "fields"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Log is the basic structure of the events that are sent to the client.
|
||||||
|
type Log struct {
|
||||||
|
Time string `json:"time,omitempty"`
|
||||||
|
Level LogLevel `json:"level,omitempty"`
|
||||||
|
Message string `json:"message,omitempty"`
|
||||||
|
Event LogEventType `json:"event,omitempty"`
|
||||||
|
Fields map[string]interface{} `json:"fields,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// IntoClientEvent unmarshals the provided ClientEvent into the proper type.
|
||||||
|
func IntoClientEvent[T EventStartStreaming | EventStopStreaming](e *ClientEvent, eventType ClientEventType) (*T, bool) {
|
||||||
|
if e.Type != eventType {
|
||||||
|
return nil, false
|
||||||
|
}
|
||||||
|
event := new(T)
|
||||||
|
err := json.Unmarshal(e.event, event)
|
||||||
|
if err != nil {
|
||||||
|
return nil, false
|
||||||
|
}
|
||||||
|
return event, true
|
||||||
|
}
|
||||||
|
|
||||||
|
// IntoServerEvent unmarshals the provided ServerEvent into the proper type.
|
||||||
|
func IntoServerEvent[T EventLog](e *ServerEvent, eventType ServerEventType) (*T, bool) {
|
||||||
|
if e.Type != eventType {
|
||||||
|
return nil, false
|
||||||
|
}
|
||||||
|
event := new(T)
|
||||||
|
err := json.Unmarshal(e.event, event)
|
||||||
|
if err != nil {
|
||||||
|
return nil, false
|
||||||
|
}
|
||||||
|
return event, true
|
||||||
|
}
|
||||||
|
|
||||||
|
// ReadEvent will read a message from the websocket connection and parse it into a valid ServerEvent.
|
||||||
|
func ReadServerEvent(c *websocket.Conn, ctx context.Context) (*ServerEvent, error) {
|
||||||
|
message, err := readMessage(c, ctx)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
event := ServerEvent{}
|
||||||
|
if err := json.Unmarshal(message, &event); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
switch event.Type {
|
||||||
|
case Logs:
|
||||||
|
event.event = message
|
||||||
|
return &event, nil
|
||||||
|
case UnknownServerEventType:
|
||||||
|
return nil, errInvalidMessageType
|
||||||
|
default:
|
||||||
|
return nil, fmt.Errorf("invalid server message type was provided: %s", event.Type)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// ReadEvent will read a message from the websocket connection and parse it into a valid ClientEvent.
|
||||||
|
func ReadClientEvent(c *websocket.Conn, ctx context.Context) (*ClientEvent, error) {
|
||||||
|
message, err := readMessage(c, ctx)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
event := ClientEvent{}
|
||||||
|
if err := json.Unmarshal(message, &event); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
switch event.Type {
|
||||||
|
case StartStreaming, StopStreaming:
|
||||||
|
event.event = message
|
||||||
|
return &event, nil
|
||||||
|
case UnknownClientEventType:
|
||||||
|
return nil, errInvalidMessageType
|
||||||
|
default:
|
||||||
|
return nil, fmt.Errorf("invalid client message type was provided: %s", event.Type)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// readMessage will read a message from the websocket connection and return the payload.
|
||||||
|
func readMessage(c *websocket.Conn, ctx context.Context) ([]byte, error) {
|
||||||
|
messageType, reader, err := c.Reader(ctx)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if messageType != websocket.MessageText {
|
||||||
|
return nil, errInvalidMessageType
|
||||||
|
}
|
||||||
|
return io.ReadAll(reader)
|
||||||
|
}
|
||||||
|
|
||||||
|
// WriteEvent will write a Event type message to the websocket connection.
|
||||||
|
func WriteEvent(c *websocket.Conn, ctx context.Context, event any) error {
|
||||||
|
payload, err := json.Marshal(event)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return c.Write(ctx, websocket.MessageText, payload)
|
||||||
|
}
|
||||||
|
|
||||||
|
// IsClosed returns true if the websocket error is a websocket.CloseError; returns false if not a
|
||||||
|
// websocket.CloseError
|
||||||
|
func IsClosed(err error, log *zerolog.Logger) bool {
|
||||||
|
var closeErr websocket.CloseError
|
||||||
|
if errors.As(err, &closeErr) {
|
||||||
|
if closeErr.Code != websocket.StatusNormalClosure {
|
||||||
|
log.Debug().Msgf("connection is already closed: (%d) %s", closeErr.Code, closeErr.Reason)
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
func AsClosed(err error) *websocket.CloseError {
|
||||||
|
var closeErr websocket.CloseError
|
||||||
|
if errors.As(err, &closeErr) {
|
||||||
|
return &closeErr
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
|
@ -0,0 +1,247 @@
|
||||||
|
package management
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
"nhooyr.io/websocket"
|
||||||
|
|
||||||
|
"github.com/cloudflare/cloudflared/internal/test"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
debugLevel *LogLevel
|
||||||
|
infoLevel *LogLevel
|
||||||
|
warnLevel *LogLevel
|
||||||
|
errorLevel *LogLevel
|
||||||
|
)
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
// created here because we can't do a reference to a const enum, i.e. &Info
|
||||||
|
debugLevel := new(LogLevel)
|
||||||
|
*debugLevel = Debug
|
||||||
|
infoLevel := new(LogLevel)
|
||||||
|
*infoLevel = Info
|
||||||
|
warnLevel := new(LogLevel)
|
||||||
|
*warnLevel = Warn
|
||||||
|
errorLevel := new(LogLevel)
|
||||||
|
*errorLevel = Error
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestIntoClientEvent_StartStreaming(t *testing.T) {
|
||||||
|
for _, test := range []struct {
|
||||||
|
name string
|
||||||
|
expected EventStartStreaming
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "no filters",
|
||||||
|
expected: EventStartStreaming{ClientEvent: ClientEvent{Type: StartStreaming}},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "level filter",
|
||||||
|
expected: EventStartStreaming{
|
||||||
|
ClientEvent: ClientEvent{Type: StartStreaming},
|
||||||
|
Filters: &StreamingFilters{
|
||||||
|
Level: infoLevel,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "events filter",
|
||||||
|
expected: EventStartStreaming{
|
||||||
|
ClientEvent: ClientEvent{Type: StartStreaming},
|
||||||
|
Filters: &StreamingFilters{
|
||||||
|
Events: []LogEventType{Cloudflared, HTTP},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "sampling filter",
|
||||||
|
expected: EventStartStreaming{
|
||||||
|
ClientEvent: ClientEvent{Type: StartStreaming},
|
||||||
|
Filters: &StreamingFilters{
|
||||||
|
Sampling: 0.5,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "level and events filters",
|
||||||
|
expected: EventStartStreaming{
|
||||||
|
ClientEvent: ClientEvent{Type: StartStreaming},
|
||||||
|
Filters: &StreamingFilters{
|
||||||
|
Level: infoLevel,
|
||||||
|
Events: []LogEventType{Cloudflared},
|
||||||
|
Sampling: 0.5,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
} {
|
||||||
|
t.Run(test.name, func(t *testing.T) {
|
||||||
|
data, err := json.Marshal(test.expected)
|
||||||
|
require.NoError(t, err)
|
||||||
|
event := ClientEvent{}
|
||||||
|
err = json.Unmarshal(data, &event)
|
||||||
|
require.NoError(t, err)
|
||||||
|
event.event = data
|
||||||
|
ce, ok := IntoClientEvent[EventStartStreaming](&event, StartStreaming)
|
||||||
|
require.True(t, ok)
|
||||||
|
require.Equal(t, test.expected.ClientEvent, ce.ClientEvent)
|
||||||
|
if test.expected.Filters != nil {
|
||||||
|
f := ce.Filters
|
||||||
|
ef := test.expected.Filters
|
||||||
|
if ef.Level != nil {
|
||||||
|
require.Equal(t, *ef.Level, *f.Level)
|
||||||
|
}
|
||||||
|
require.ElementsMatch(t, ef.Events, f.Events)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestIntoClientEvent_StopStreaming(t *testing.T) {
|
||||||
|
event := ClientEvent{
|
||||||
|
Type: StopStreaming,
|
||||||
|
event: []byte(`{"type": "stop_streaming"}`),
|
||||||
|
}
|
||||||
|
ce, ok := IntoClientEvent[EventStopStreaming](&event, StopStreaming)
|
||||||
|
require.True(t, ok)
|
||||||
|
require.Equal(t, EventStopStreaming{ClientEvent: ClientEvent{Type: StopStreaming}}, *ce)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestIntoClientEvent_Invalid(t *testing.T) {
|
||||||
|
event := ClientEvent{
|
||||||
|
Type: UnknownClientEventType,
|
||||||
|
event: []byte(`{"type": "invalid"}`),
|
||||||
|
}
|
||||||
|
_, ok := IntoClientEvent[EventStartStreaming](&event, StartStreaming)
|
||||||
|
require.False(t, ok)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestIntoServerEvent_Logs(t *testing.T) {
|
||||||
|
event := ServerEvent{
|
||||||
|
Type: Logs,
|
||||||
|
event: []byte(`{"type": "logs"}`),
|
||||||
|
}
|
||||||
|
ce, ok := IntoServerEvent(&event, Logs)
|
||||||
|
require.True(t, ok)
|
||||||
|
require.Equal(t, EventLog{ServerEvent: ServerEvent{Type: Logs}}, *ce)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestIntoServerEvent_Invalid(t *testing.T) {
|
||||||
|
event := ServerEvent{
|
||||||
|
Type: UnknownServerEventType,
|
||||||
|
event: []byte(`{"type": "invalid"}`),
|
||||||
|
}
|
||||||
|
_, ok := IntoServerEvent(&event, Logs)
|
||||||
|
require.False(t, ok)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestReadServerEvent(t *testing.T) {
|
||||||
|
sentEvent := EventLog{
|
||||||
|
ServerEvent: ServerEvent{Type: Logs},
|
||||||
|
Logs: []*Log{
|
||||||
|
{
|
||||||
|
Time: time.Now().UTC().Format(time.RFC3339),
|
||||||
|
Event: HTTP,
|
||||||
|
Level: Info,
|
||||||
|
Message: "test",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
client, server := test.WSPipe(nil, nil)
|
||||||
|
server.CloseRead(context.Background())
|
||||||
|
defer func() {
|
||||||
|
server.Close(websocket.StatusInternalError, "")
|
||||||
|
}()
|
||||||
|
go func() {
|
||||||
|
err := WriteEvent(server, context.Background(), &sentEvent)
|
||||||
|
require.NoError(t, err)
|
||||||
|
}()
|
||||||
|
event, err := ReadServerEvent(client, context.Background())
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Equal(t, sentEvent.Type, event.Type)
|
||||||
|
client.Close(websocket.StatusInternalError, "")
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestReadServerEvent_InvalidWebSocketMessageType(t *testing.T) {
|
||||||
|
client, server := test.WSPipe(nil, nil)
|
||||||
|
server.CloseRead(context.Background())
|
||||||
|
defer func() {
|
||||||
|
server.Close(websocket.StatusInternalError, "")
|
||||||
|
}()
|
||||||
|
go func() {
|
||||||
|
err := server.Write(context.Background(), websocket.MessageBinary, []byte("test1234"))
|
||||||
|
require.NoError(t, err)
|
||||||
|
}()
|
||||||
|
_, err := ReadServerEvent(client, context.Background())
|
||||||
|
require.Error(t, err)
|
||||||
|
client.Close(websocket.StatusInternalError, "")
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestReadServerEvent_InvalidMessageType(t *testing.T) {
|
||||||
|
sentEvent := ClientEvent{Type: ClientEventType(UnknownServerEventType)}
|
||||||
|
client, server := test.WSPipe(nil, nil)
|
||||||
|
server.CloseRead(context.Background())
|
||||||
|
defer func() {
|
||||||
|
server.Close(websocket.StatusInternalError, "")
|
||||||
|
}()
|
||||||
|
go func() {
|
||||||
|
err := WriteEvent(server, context.Background(), &sentEvent)
|
||||||
|
require.NoError(t, err)
|
||||||
|
}()
|
||||||
|
_, err := ReadServerEvent(client, context.Background())
|
||||||
|
require.ErrorIs(t, err, errInvalidMessageType)
|
||||||
|
client.Close(websocket.StatusInternalError, "")
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestReadClientEvent(t *testing.T) {
|
||||||
|
sentEvent := EventStartStreaming{
|
||||||
|
ClientEvent: ClientEvent{Type: StartStreaming},
|
||||||
|
}
|
||||||
|
client, server := test.WSPipe(nil, nil)
|
||||||
|
client.CloseRead(context.Background())
|
||||||
|
defer func() {
|
||||||
|
client.Close(websocket.StatusInternalError, "")
|
||||||
|
}()
|
||||||
|
go func() {
|
||||||
|
err := WriteEvent(client, context.Background(), &sentEvent)
|
||||||
|
require.NoError(t, err)
|
||||||
|
}()
|
||||||
|
event, err := ReadClientEvent(server, context.Background())
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Equal(t, sentEvent.Type, event.Type)
|
||||||
|
server.Close(websocket.StatusInternalError, "")
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestReadClientEvent_InvalidWebSocketMessageType(t *testing.T) {
|
||||||
|
client, server := test.WSPipe(nil, nil)
|
||||||
|
client.CloseRead(context.Background())
|
||||||
|
defer func() {
|
||||||
|
client.Close(websocket.StatusInternalError, "")
|
||||||
|
}()
|
||||||
|
go func() {
|
||||||
|
err := client.Write(context.Background(), websocket.MessageBinary, []byte("test1234"))
|
||||||
|
require.NoError(t, err)
|
||||||
|
}()
|
||||||
|
_, err := ReadClientEvent(server, context.Background())
|
||||||
|
require.Error(t, err)
|
||||||
|
server.Close(websocket.StatusInternalError, "")
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestReadClientEvent_InvalidMessageType(t *testing.T) {
|
||||||
|
sentEvent := ClientEvent{Type: UnknownClientEventType}
|
||||||
|
client, server := test.WSPipe(nil, nil)
|
||||||
|
client.CloseRead(context.Background())
|
||||||
|
defer func() {
|
||||||
|
client.Close(websocket.StatusInternalError, "")
|
||||||
|
}()
|
||||||
|
go func() {
|
||||||
|
err := WriteEvent(client, context.Background(), &sentEvent)
|
||||||
|
require.NoError(t, err)
|
||||||
|
}()
|
||||||
|
_, err := ReadClientEvent(server, context.Background())
|
||||||
|
require.ErrorIs(t, err, errInvalidMessageType)
|
||||||
|
server.Close(websocket.StatusInternalError, "")
|
||||||
|
}
|
|
@ -0,0 +1,177 @@
|
||||||
|
package management
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os"
|
||||||
|
"sync"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
jsoniter "github.com/json-iterator/go"
|
||||||
|
"github.com/rs/zerolog"
|
||||||
|
)
|
||||||
|
|
||||||
|
var json = jsoniter.ConfigFastest
|
||||||
|
|
||||||
|
// Logger manages the number of management streaming log sessions
|
||||||
|
type Logger struct {
|
||||||
|
sessions []*session
|
||||||
|
mu sync.RWMutex
|
||||||
|
|
||||||
|
// Unique logger that isn't a io.Writer of the list of zerolog writers. This helps prevent management log
|
||||||
|
// statements from creating infinite recursion to export messages to a session and allows basic debugging and
|
||||||
|
// error statements to be issued in the management code itself.
|
||||||
|
Log *zerolog.Logger
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewLogger() *Logger {
|
||||||
|
log := zerolog.New(zerolog.ConsoleWriter{
|
||||||
|
Out: os.Stdout,
|
||||||
|
TimeFormat: time.RFC3339,
|
||||||
|
}).With().Timestamp().Logger().Level(zerolog.InfoLevel)
|
||||||
|
return &Logger{
|
||||||
|
Log: &log,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
type LoggerListener interface {
|
||||||
|
// ActiveSession returns the first active session for the requested actor.
|
||||||
|
ActiveSession(actor) *session
|
||||||
|
// ActiveSession returns the count of active sessions.
|
||||||
|
ActiveSessions() int
|
||||||
|
// Listen appends the session to the list of sessions that receive log events.
|
||||||
|
Listen(*session)
|
||||||
|
// Remove a session from the available sessions that were receiving log events.
|
||||||
|
Remove(*session)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (l *Logger) ActiveSession(actor actor) *session {
|
||||||
|
l.mu.RLock()
|
||||||
|
defer l.mu.RUnlock()
|
||||||
|
for _, session := range l.sessions {
|
||||||
|
if session.actor.ID == actor.ID && session.active.Load() {
|
||||||
|
return session
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (l *Logger) ActiveSessions() int {
|
||||||
|
l.mu.RLock()
|
||||||
|
defer l.mu.RUnlock()
|
||||||
|
count := 0
|
||||||
|
for _, session := range l.sessions {
|
||||||
|
if session.active.Load() {
|
||||||
|
count += 1
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return count
|
||||||
|
}
|
||||||
|
|
||||||
|
func (l *Logger) Listen(session *session) {
|
||||||
|
l.mu.Lock()
|
||||||
|
defer l.mu.Unlock()
|
||||||
|
session.active.Store(true)
|
||||||
|
l.sessions = append(l.sessions, session)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (l *Logger) Remove(session *session) {
|
||||||
|
l.mu.Lock()
|
||||||
|
defer l.mu.Unlock()
|
||||||
|
index := -1
|
||||||
|
for i, v := range l.sessions {
|
||||||
|
if v == session {
|
||||||
|
index = i
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if index == -1 {
|
||||||
|
// Not found
|
||||||
|
return
|
||||||
|
}
|
||||||
|
copy(l.sessions[index:], l.sessions[index+1:])
|
||||||
|
l.sessions = l.sessions[:len(l.sessions)-1]
|
||||||
|
}
|
||||||
|
|
||||||
|
// Write will write the log event to all sessions that have available capacity. For those that are full, the message
|
||||||
|
// will be dropped.
|
||||||
|
// This function is the interface that zerolog expects to call when a log event is to be written out.
|
||||||
|
func (l *Logger) Write(p []byte) (int, error) {
|
||||||
|
l.mu.RLock()
|
||||||
|
defer l.mu.RUnlock()
|
||||||
|
// return early if no active sessions
|
||||||
|
if len(l.sessions) == 0 {
|
||||||
|
return len(p), nil
|
||||||
|
}
|
||||||
|
event, err := parseZerologEvent(p)
|
||||||
|
// drop event if unable to parse properly
|
||||||
|
if err != nil {
|
||||||
|
l.Log.Debug().Msg("unable to parse log event")
|
||||||
|
return len(p), nil
|
||||||
|
}
|
||||||
|
for _, session := range l.sessions {
|
||||||
|
session.Insert(event)
|
||||||
|
}
|
||||||
|
return len(p), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (l *Logger) WriteLevel(level zerolog.Level, p []byte) (n int, err error) {
|
||||||
|
return l.Write(p)
|
||||||
|
}
|
||||||
|
|
||||||
|
func parseZerologEvent(p []byte) (*Log, error) {
|
||||||
|
var fields map[string]interface{}
|
||||||
|
iter := json.BorrowIterator(p)
|
||||||
|
defer json.ReturnIterator(iter)
|
||||||
|
iter.ReadVal(&fields)
|
||||||
|
if iter.Error != nil {
|
||||||
|
return nil, iter.Error
|
||||||
|
}
|
||||||
|
logTime := time.Now().UTC().Format(zerolog.TimeFieldFormat)
|
||||||
|
if t, ok := fields[TimeKey]; ok {
|
||||||
|
if t, ok := t.(string); ok {
|
||||||
|
logTime = t
|
||||||
|
}
|
||||||
|
}
|
||||||
|
logLevel := Debug
|
||||||
|
// A zerolog Debug event can be created and then an error can be added
|
||||||
|
// via .Err(error), if so, we upgrade the level to error.
|
||||||
|
if _, hasError := fields["error"]; hasError {
|
||||||
|
logLevel = Error
|
||||||
|
} else {
|
||||||
|
if level, ok := fields[LevelKey]; ok {
|
||||||
|
if level, ok := level.(string); ok {
|
||||||
|
if logLevel, ok = ParseLogLevel(level); !ok {
|
||||||
|
logLevel = Debug
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// Assume the event type is Cloudflared if unable to parse/find. This could be from log events that haven't
|
||||||
|
// yet been tagged with the appropriate EventType yet.
|
||||||
|
logEvent := Cloudflared
|
||||||
|
e := fields[EventTypeKey]
|
||||||
|
if e != nil {
|
||||||
|
if eventNumber, ok := e.(float64); ok {
|
||||||
|
logEvent = LogEventType(eventNumber)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
logMessage := ""
|
||||||
|
if m, ok := fields[MessageKey]; ok {
|
||||||
|
if m, ok := m.(string); ok {
|
||||||
|
logMessage = m
|
||||||
|
}
|
||||||
|
}
|
||||||
|
event := Log{
|
||||||
|
Time: logTime,
|
||||||
|
Level: logLevel,
|
||||||
|
Event: logEvent,
|
||||||
|
Message: logMessage,
|
||||||
|
}
|
||||||
|
// Remove the keys that have top level keys on Log
|
||||||
|
delete(fields, TimeKey)
|
||||||
|
delete(fields, LevelKey)
|
||||||
|
delete(fields, EventTypeKey)
|
||||||
|
delete(fields, MessageKey)
|
||||||
|
// The rest of the keys go into the Fields
|
||||||
|
event.Fields = fields
|
||||||
|
return &event, nil
|
||||||
|
}
|
|
@ -0,0 +1,152 @@
|
||||||
|
package management
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/rs/zerolog"
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
)
|
||||||
|
|
||||||
|
// No listening sessions will not write to the channel
|
||||||
|
func TestLoggerWrite_NoSessions(t *testing.T) {
|
||||||
|
logger := NewLogger()
|
||||||
|
zlog := zerolog.New(logger).With().Timestamp().Logger().Level(zerolog.InfoLevel)
|
||||||
|
|
||||||
|
zlog.Info().Msg("hello")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Validate that the session receives the event
|
||||||
|
func TestLoggerWrite_OneSession(t *testing.T) {
|
||||||
|
logger := NewLogger()
|
||||||
|
zlog := zerolog.New(logger).With().Timestamp().Logger().Level(zerolog.InfoLevel)
|
||||||
|
_, cancel := context.WithCancel(context.Background())
|
||||||
|
defer cancel()
|
||||||
|
|
||||||
|
session := newSession(logWindow, actor{ID: actorID}, cancel)
|
||||||
|
logger.Listen(session)
|
||||||
|
defer logger.Remove(session)
|
||||||
|
assert.Equal(t, 1, logger.ActiveSessions())
|
||||||
|
assert.Equal(t, session, logger.ActiveSession(actor{ID: actorID}))
|
||||||
|
zlog.Info().Int(EventTypeKey, int(HTTP)).Msg("hello")
|
||||||
|
select {
|
||||||
|
case event := <-session.listener:
|
||||||
|
assert.NotEmpty(t, event.Time)
|
||||||
|
assert.Equal(t, "hello", event.Message)
|
||||||
|
assert.Equal(t, Info, event.Level)
|
||||||
|
assert.Equal(t, HTTP, event.Event)
|
||||||
|
default:
|
||||||
|
assert.Fail(t, "expected an event to be in the listener")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Validate all sessions receive the same event
|
||||||
|
func TestLoggerWrite_MultipleSessions(t *testing.T) {
|
||||||
|
logger := NewLogger()
|
||||||
|
zlog := zerolog.New(logger).With().Timestamp().Logger().Level(zerolog.InfoLevel)
|
||||||
|
_, cancel := context.WithCancel(context.Background())
|
||||||
|
defer cancel()
|
||||||
|
|
||||||
|
session1 := newSession(logWindow, actor{}, cancel)
|
||||||
|
logger.Listen(session1)
|
||||||
|
defer logger.Remove(session1)
|
||||||
|
assert.Equal(t, 1, logger.ActiveSessions())
|
||||||
|
|
||||||
|
session2 := newSession(logWindow, actor{}, cancel)
|
||||||
|
logger.Listen(session2)
|
||||||
|
assert.Equal(t, 2, logger.ActiveSessions())
|
||||||
|
|
||||||
|
zlog.Info().Int(EventTypeKey, int(HTTP)).Msg("hello")
|
||||||
|
for _, session := range []*session{session1, session2} {
|
||||||
|
select {
|
||||||
|
case event := <-session.listener:
|
||||||
|
assert.NotEmpty(t, event.Time)
|
||||||
|
assert.Equal(t, "hello", event.Message)
|
||||||
|
assert.Equal(t, Info, event.Level)
|
||||||
|
assert.Equal(t, HTTP, event.Event)
|
||||||
|
default:
|
||||||
|
assert.Fail(t, "expected an event to be in the listener")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Close session2 and make sure session1 still receives events
|
||||||
|
logger.Remove(session2)
|
||||||
|
zlog.Info().Int(EventTypeKey, int(HTTP)).Msg("hello2")
|
||||||
|
select {
|
||||||
|
case event := <-session1.listener:
|
||||||
|
assert.NotEmpty(t, event.Time)
|
||||||
|
assert.Equal(t, "hello2", event.Message)
|
||||||
|
assert.Equal(t, Info, event.Level)
|
||||||
|
assert.Equal(t, HTTP, event.Event)
|
||||||
|
default:
|
||||||
|
assert.Fail(t, "expected an event to be in the listener")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Make sure a held reference to session2 doesn't receive events after being closed
|
||||||
|
select {
|
||||||
|
case <-session2.listener:
|
||||||
|
assert.Fail(t, "An event was not expected to be in the session listener")
|
||||||
|
default:
|
||||||
|
// pass
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
type mockWriter struct {
|
||||||
|
event *Log
|
||||||
|
err error
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *mockWriter) Write(p []byte) (int, error) {
|
||||||
|
m.event, m.err = parseZerologEvent(p)
|
||||||
|
return len(p), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Validate all event types are set properly
|
||||||
|
func TestParseZerologEvent_EventTypes(t *testing.T) {
|
||||||
|
writer := mockWriter{}
|
||||||
|
zlog := zerolog.New(&writer).With().Timestamp().Logger().Level(zerolog.InfoLevel)
|
||||||
|
|
||||||
|
for _, test := range []LogEventType{
|
||||||
|
Cloudflared,
|
||||||
|
HTTP,
|
||||||
|
TCP,
|
||||||
|
UDP,
|
||||||
|
} {
|
||||||
|
t.Run(test.String(), func(t *testing.T) {
|
||||||
|
defer func() { writer.err = nil }()
|
||||||
|
zlog.Info().Int(EventTypeKey, int(test)).Msg("test")
|
||||||
|
require.NoError(t, writer.err)
|
||||||
|
require.Equal(t, test, writer.event.Event)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
// Invalid defaults to Cloudflared LogEventType
|
||||||
|
t.Run("invalid", func(t *testing.T) {
|
||||||
|
defer func() { writer.err = nil }()
|
||||||
|
zlog.Info().Str(EventTypeKey, "unknown").Msg("test")
|
||||||
|
require.NoError(t, writer.err)
|
||||||
|
require.Equal(t, Cloudflared, writer.event.Event)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
// Validate top-level keys are removed from Fields
|
||||||
|
func TestParseZerologEvent_Fields(t *testing.T) {
|
||||||
|
writer := mockWriter{}
|
||||||
|
zlog := zerolog.New(&writer).With().Timestamp().Logger().Level(zerolog.InfoLevel)
|
||||||
|
zlog.Info().Int(EventTypeKey, int(Cloudflared)).Str("test", "test").Msg("test message")
|
||||||
|
require.NoError(t, writer.err)
|
||||||
|
event := writer.event
|
||||||
|
require.NotEmpty(t, event.Time)
|
||||||
|
require.Equal(t, Cloudflared, event.Event)
|
||||||
|
require.Equal(t, Info, event.Level)
|
||||||
|
require.Equal(t, "test message", event.Message)
|
||||||
|
|
||||||
|
// Make sure Fields doesn't have other set keys used in the Log struct
|
||||||
|
require.NotEmpty(t, event.Fields)
|
||||||
|
require.Equal(t, "test", event.Fields["test"])
|
||||||
|
require.NotContains(t, event.Fields, EventTypeKey)
|
||||||
|
require.NotContains(t, event.Fields, LevelKey)
|
||||||
|
require.NotContains(t, event.Fields, MessageKey)
|
||||||
|
require.NotContains(t, event.Fields, TimeKey)
|
||||||
|
}
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue