Dimitris Apostolou
197a70c9c4
Fix typos
2021-11-12 17:38:06 +02:00
Sudarsan Reddy
0146a8d8ed
TUN-5285: Fallback to HTTP2 immediately if connection times out with no network activity
2021-11-04 10:42:53 +00:00
Nuno Diegues
573d410606
Revert "TUN-5184: Make sure outstanding websocket write is finished, and no more writes after shutdown"
...
This reverts commit f8fbbcd806
.
2021-10-25 19:51:52 +01:00
cthuang
f8fbbcd806
TUN-5184: Make sure outstanding websocket write is finished, and no more writes after shutdown
2021-10-25 08:27:40 +00:00
cthuang
2ce11a20c4
TUN-5287: Fix misuse of wait group in TestQUICServer that caused the test to exit immediately
2021-10-22 13:40:51 +00:00
Sudarsan Reddy
ceb509ee98
TUN-5138: Switch to QUIC on auto protocol based on threshold
2021-10-14 09:18:20 +01:00
Sudarsan Reddy
2822fbe3db
TUN-5249: Revert "TUN-5138: Switch to QUIC on auto protocol based on threshold"
...
This reverts commit e445fd92f7
2021-10-13 19:06:31 +01:00
Sudarsan Reddy
e445fd92f7
TUN-5138: Switch to QUIC on auto protocol based on threshold
2021-10-11 11:05:20 +00:00
Sudarsan Reddy
bccf4a63dc
UN-5213: Increase MaxStreams value for QUIC transport
...
The default max streams value of 100 is rather small when subject to
high load in terms of connecting QUIC with streams faster than it can
create new ones. This high value allows for more throughput.
2021-10-08 13:48:20 +01:00
Sudarsan Reddy
7059ef8e13
TUN-5195: Do not set empty body if not applicable
...
Go's client defaults to chunked encoding after a 200ms delay if the following cases are true:
* the request body blocks
* the content length is not set (or set to -1)
* the method doesn't usually have a body (GET, HEAD, DELETE, ...)
* there is no transfer-encoding=chunked already set.
So for non websocket requests, if transfer-encoding isn't chunked and content length is 0, we dont set a request body.
2021-10-07 15:47:27 +01:00
Sudarsan Reddy
470a85e65d
TUN-5160: Set request.ContentLength when this value is in request header
2021-09-27 14:12:11 +01:00
Sudarsan Reddy
d7da74cb9e
TUN-5142: defer close rpcconn inside unregister instead of ServeControlStream
2021-09-24 12:56:31 +01:00
Sudarsan Reddy
27e1277a3b
TUN-5142: Add asynchronous servecontrolstream for QUIC
...
ServeControlStream accidentally became non-blocking in the last quic
change causing stream to not be returned until a SIGTERM was received.
This change makes ServeControlStream be non-blocking for QUIC streams.
2021-09-24 10:00:43 +00:00
cthuang
6238fd9022
TUN-5141: Make sure websocket pinger returns before streaming returns
2021-09-23 16:54:55 +01:00
Nuno Diegues
f985ed567f
TUN-5128: Enforce maximum grace period
...
This maximum grace period will be honored by Cloudflare edge such that
either side will close the connection after unregistration at most
by this time (3min as of this commit):
- If the connection is unused, it is already closed as soon as possible.
- If the connection is still used, it is closed on the cloudflared configured grace-period.
Even if cloudflared does not close the connection by the grace-period time,
the edge will do so.
2021-09-21 16:48:37 +00:00
Sudarsan Reddy
fd14bf440b
TUN-5118: Quic connection now detects duplicate connections similar to http2
2021-09-21 06:30:09 +00:00
Areg Harutyunyan
d04f48d872
TUN-5029: Do not strip cf- prefixed headers
2021-09-02 12:21:01 -05:00
Rishabh Bector
a4a9f45b0a
TUN-4821: Make quick tunnels the default in cloudflared
2021-08-26 15:53:02 +00:00
Sudarsan Reddy
1da4fbbe0b
TUN-4970: Only default to http2 for warp-routing if protocol is h2mux
2021-08-26 15:12:31 +00:00
Sudarsan Reddy
b6c85401a5
TUN-4889: Add back appendtagheaders function
...
TUN-4701 accidentally removed adding tagheaders. This commit adds it
back.
2021-08-23 15:29:48 +00:00
Sudarsan Reddy
12ad264eb3
TUN-4866: Add Control Stream for QUIC
...
This commit adds support to Register and Unregister Connections via RPC
on the QUIC transport protocol
2021-08-17 14:50:32 +00:00
Sudarsan Reddy
e49a7a4389
TUN-4597: Added HTTPProxy for QUIC
2021-08-04 12:50:18 +00:00
Sudarsan Reddy
ed024d0741
TUN-4597: Add a QUIC server skeleton
...
- Added a QUIC server to accept streams
- Unit test for this server also tests ALPN
- Temporary echo capability for HTTP ConnectionType
2021-08-03 10:03:47 +00:00
Nuno Diegues
fa8aa02270
TUN-4819: Tolerate protocol TXT record lookup failing
2021-07-29 11:44:39 +00:00
Nuno Diegues
0924549efd
TUN-4811: Publish quick tunnels' hostname in /metrics under `userHostname` for backwards-compatibility
2021-07-29 10:20:43 +01:00
Sudarsan Reddy
ed1389ef08
TUN-4814: Revert "TUN-4699: Make quick tunnels the default in cloudflared"
...
This reverts commit 18992efa0c
.
2021-07-28 10:02:55 +01:00
Rishabh Bector
18992efa0c
TUN-4699: Make quick tunnels the default in cloudflared
2021-07-26 15:57:36 +00:00
Sudarsan Reddy
8f3526289a
TUN-4701: Split Proxy into ProxyHTTP and ProxyTCP
...
http.Request now is only used by ProxyHTTP and not required if the
proxying is TCP. The dest conversion is handled by the transport layer.
2021-07-19 13:43:59 +00:00
Rishabh Bector
3eb9efd9f0
TUN-4521: Modify cloudflared to use zoneless-tunnels-worker for free tunnels
2021-06-29 09:39:18 +01:00
Nuno Diegues
b06fe0fc5f
TUN-4571: Fix proxying to unix sockets when using HTTP2 transport to Cloudflare Edge
2021-06-21 11:43:14 +01:00
Sudarsan Reddy
951d13d76c
TUN-4456: Replaced instances of Tick() with Ticker() in h2mux paths
...
time.Tick() does not get garbage collected because the channel
underneath never gets deleted and the underlying Ticker can never be
recovered by the garbage collector. We replace this with NewTicker() to
avoid this.
2021-05-25 18:07:06 +01:00
Igor Postelnik
8ca0d86c85
TUN-3863: Consolidate header handling logic in the connection package; move headers definitions from h2mux to packages that manage them; cleanup header conversions
...
All header transformation code from h2mux has been consolidated in the connection package since it's used by both h2mux and http2 logic.
Exported headers used by proxying between edge and cloudflared so then can be shared by tunnel service on the edge.
Moved access-related headers to corresponding packages that have the code that sets/uses these headers.
Removed tunnel hostname tracking from h2mux since it wasn't used by anything. We will continue to set the tunnel hostname header from the edge for backward compatibilty, but it's no longer used by cloudflared.
Move bastion-related logic into carrier package, untangled dependencies between carrier, origin, and websocket packages.
2021-03-29 21:57:56 +00:00
Igor Postelnik
da4d0b2bae
TUN-4067: Reformat code for consistent import order, grouping, and fix formatting. Added goimports target to the Makefile to make this easier in the future.
2021-03-24 10:53:29 -05:00
Nuno Diegues
89b738f8fa
TUN-4026: Fix regression where HTTP2 edge transport was no longer propagating control plane errors
2021-03-04 18:45:39 +00:00
Sudarsan Reddy
e20c4f8752
TUN-3838: ResponseWriter no longer reads and origin error tests
2021-02-23 14:19:47 +00:00
cthuang
ab4dda5427
TUN-3868: Refactor singleTCPService and bridgeService to tcpOverWSService and rawTCPService
2021-02-23 14:19:47 +00:00
cthuang
2146f71b45
TUN-3753: Select http2 protocol when warp routing is enabled
2021-02-23 14:19:47 +00:00
cthuang
3b93914612
TUN-3764: Actively flush data for TCP streams
2021-02-23 14:19:47 +00:00
Sudarsan Reddy
368066a966
TUN-3615: added support to proxy tcp streams
...
added ingress.DefaultStreamHandler and a basic test for tcp stream proxy
moved websocket.Stream to ingress
cloudflared no longer picks tcpstream host from header
2021-02-23 14:19:47 +00:00
cthuang
e2262085e5
TUN-3617: Separate service from client, and implement different client for http vs. tcp origins
...
- extracted ResponseWriter from proxyConnection
- added bastion tests over websocket
- removed HTTPResp()
- added some docstrings
- Renamed some ingress clients as proxies
- renamed instances of client to proxy in connection and origin
- Stream no longer takes a context and logger.Service
2021-02-23 14:19:44 +00:00
Igor Postelnik
cf562ef8c8
TUN-3635: Send event when unregistering tunnel for gracful shutdown so /ready endpoint reports down status befoe connections finish handling pending requests.
2021-02-08 15:38:42 +00:00
Igor Postelnik
0b16a473da
TUN-3869: Improve reliability of graceful shutdown.
...
- Don't rely on edge to close connection on graceful shutdown in h2mux, start muxer shutdown from cloudflared.
- Don't retry failed connections after graceful shutdown has started.
- After graceful shutdown channel is closed we stop waiting for retry timer and don't try to restart tunnel loop.
- Use readonly channel for graceful shutdown in functions that only consume the signal
2021-02-08 14:30:32 +00:00
Adam Chalmers
0d22106416
TUN-3848: Use transport logger for h2mux
2021-02-03 17:31:16 -06:00
Igor Postelnik
a945518404
TUN-3811: Better error reporting on http2 connection termination. Registration errors from control loop are now propagated out of the connection server code. Unified error handling between h2mux and http2 connections so we log and retry errors the same way, regardless of underlying transport.
2021-01-28 10:38:30 -06:00
Igor Postelnik
d503aeaf77
TUN-3118: Changed graceful shutdown to immediately unregister tunnel from the edge, keep the connection open until the edge drops it or grace period expires
2021-01-22 11:14:36 -06:00
Igor Postelnik
db0562c7b8
Fixed connection error handling by removing duplicated errors, standardizing on non-pointer error types
2021-01-22 10:58:06 -06:00
Nuno Diegues
2d0b86f2e4
TUN-3777: Fix /ready endpoint for classic tunnels
...
Classic tunnels flow was triggering an event for RegisteringTunnel for
every connection that was about to be established, and then a Connected
event for every connection established.
However, the RegistreringTunnel event had no connection ID, always
causing it to unset/disconnect the 0th connection making the /ready
endpoint report incorrect numbers for classic tunnels.
2021-01-19 13:02:44 +00:00
Igor Postelnik
04b1e4f859
TUN-3738: Refactor observer to avoid potential of blocking on tunnel notifications
2021-01-18 11:16:23 +00:00
Areg Harutyunyan
55bf904689
TUN-3471: Add structured log context to logs
2021-01-05 20:21:16 +00:00
Areg Harutyunyan
870f5fa907
TUN-3470: Replace in-house logger calls with zerolog
2020-12-23 14:15:17 -06:00
Adam Chalmers
38fb0b28b6
TUN-3593: /ready endpoint for k8s readiness. Move tunnel events out of UI package, into connection package.
2020-12-02 15:22:59 -06:00
Adam Chalmers
69fd502db3
TUN-3581: Tunnels can be run by name using only --credentials-file, no
...
origin cert necessary.
2020-11-25 09:54:28 -06:00
cthuang
a1a554a29d
TUN-3559: Share response meta header with other packages
2020-11-18 16:51:03 +00:00
cthuang
fdb1f961b3
TUN-3557: Detect SSE if content-type starts with text/event-stream
2020-11-18 15:59:41 +00:00
cthuang
ebc003d478
TUN-3514: Transport logger write to UI when UI is enabled
2020-11-11 15:21:00 +00:00
cthuang
543169c893
TUN-3490: Make sure OriginClient implementation doesn't write after Proxy return
2020-11-11 15:21:00 +00:00
cthuang
d5769519b2
TUN-3489: Add unit tests to cover proxy logic in connection package of cloudflared
2020-11-11 15:21:00 +00:00
cthuang
5974fb4cfd
TUN-3500: Integrate replace h2mux by http2 work with multiple origin support
2020-11-11 15:20:57 +00:00
cthuang
eef5b78eac
TUN-3480: Support SSE with http2 connection, and add SSE handler to hello-world server
2020-11-11 15:12:17 +00:00
cthuang
6b86f81c4a
TUN-3403: Unit test for origin/proxy to test serving HTTP and Websocket
2020-11-11 15:12:15 +00:00
cthuang
a490443630
TUN-3458: Upgrade to http2 when available, fallback to h2mux when we reach max retries
2020-11-11 15:11:42 +00:00
cthuang
b5cdf3b2c7
TUN-3456: New protocol option auto to automatically select between http2 and h2mux
2020-11-11 15:11:42 +00:00
cthuang
6886e5f90a
TUN-3467: Serialize cf-cloudflared-response-meta during package initialization using jsoniter
2020-11-11 15:11:42 +00:00
cthuang
9ac40dcf04
TUN-3462: Refactor cloudflared to separate origin from connection
2020-11-11 15:11:42 +00:00
cthuang
8d7b2575ba
TUN-3400: Use Go HTTP2 library as transport to connect with the edge
2020-11-11 15:11:42 +00:00
cthuang
2c9b7361b7
TUN-3427: Define a struct that only implements RegistrationServer in tunnelpogs
2020-10-01 09:08:32 +01:00
cthuang
fb82b2ced5
TUN-3019: Remove declarative tunnel entry code
2020-05-30 05:54:17 +08:00
Dalton
046be63253
AUTH-2596 added new logger package and replaced logrus
2020-05-27 17:07:19 -05:00
Adam Chalmers
acea15161c
TUN-2854: Quick Reconnects should be an optional supported feature
2020-03-31 08:59:00 -05:00
Areg Harutyunyan
5bd4028ea7
TUN-2761: Use the new header management functions in cloudflared
2020-03-08 03:38:54 +00:00
Areg Harutyunyan
26f5f80811
TUN-2776: Add header serialization feature in cloudflared
2020-02-28 17:36:29 +00:00
Adam Chalmers
a60c0273f5
TUN-2714: New edge discovery. Connections try to reconnect to the same edge IP.
2020-02-14 19:49:54 +00:00
Nick Vollmar
7367827a11
TUN-2646: Make --edge flag work again for local development
2019-12-23 23:11:00 -06:00
Nick Vollmar
7e31b77646
TUN-2637: Manage edge IPs in a region-aware manner
2019-12-19 21:58:23 +00:00
Nick Vollmar
bbf31377c2
TUN-2607: add RPC stream helpers
2019-12-03 15:38:16 -06:00
Nick Vollmar
8f4fd70783
TUN-2606: add DialEdge helpers
2019-12-03 14:52:33 -06:00
Ashcon Partovi
43babbc2f9
Fix "happy eyeballs" not being disabled since Golang 1.12 upgrade
...
* The Dialer.DualStack setting is now ignored and deprecated; RFC 6555 Fast Fallback ("Happy Eyeballs") is now enabled by default. To disable, set Dialer.FallbackDelay to a negative value.
2019-11-25 17:54:20 +00:00
Chung-Ting Huang
13bf65ce4e
TUN-2506: Expose active streams metrics
2019-11-07 14:09:31 -06:00
Chung-Ting Huang
a52f47c9a9
TUN-2460: Configure according to the ClientConfig recevied from a successful Connect
2019-10-24 14:53:14 +00:00
Chung-Ting Huang
5bcb2da0fe
TUN-2309: Split ConnectResult into ConnectError and ConnectSuccess, each implementing its own capnp serialization logic
2019-09-19 13:47:41 -05:00
Adam Chalmers
4f23da2a6d
TUN-2315: Replace Scope with IntentLabel
2019-09-18 15:11:46 -05:00
Adam Chalmers
dd521aba29
TUN-2280: Revert "TUN-2260: add name/group to CapnpConnectParameters, remove Scope"
...
This reverts commit 817c3be9da5465043c2a2fda6c48f7ada760682e.
2019-09-06 15:59:32 +00:00
Adam Chalmers
a06390a078
TUN-2201: change SRV records used by cloudflared
...
This changes cloudflarewarp.com to argotunnel.com and _warp to
_origintunneld. We've changed which zone we host the SRV records
for Argo Tunnel on.
2019-09-06 15:01:58 +00:00
Nick Vollmar
dc730615f2
TUN-2260: add name/group to CapnpConnectParameters, remove Scope
2019-09-05 15:36:16 +00:00
Nick Vollmar
74f3a55c57
TUN-2117: read group/system-name from CLI, send it to edge
2019-08-01 22:04:05 +00:00
Chung-Ting Huang
80a15547e3
TUN-1961: Create EdgeConnectionManager to maintain outbound connections to the edge
2019-06-18 16:37:38 -05:00
Chung-Ting Huang
d26a8c5d44
TUN-1893: Proxy requests to the origin based on tunnel hostname
2019-06-13 14:46:22 -05:00
Chung-Ting Huang
14f50d0922
TUN-1807: Send cloudflared version in Connect RPC
2019-05-06 16:13:12 -05:00
Chung-Ting Huang
2bef5dbe72
TUN-1682: Add context to OpenStream to prevent it from blocking indefinitely.
2019-04-11 13:44:42 -05:00
Chung-Ting Huang
c18702f297
TUN-1626: Create new supervisor to establish connection with origintunneld
2019-04-04 15:39:22 -05:00