592 lines
18 KiB
Go
592 lines
18 KiB
Go
package tunnel
|
|
|
|
import (
|
|
"crypto/rand"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"os"
|
|
"path/filepath"
|
|
"sort"
|
|
"strings"
|
|
"text/tabwriter"
|
|
"time"
|
|
|
|
"github.com/google/uuid"
|
|
"github.com/mitchellh/go-homedir"
|
|
"github.com/pkg/errors"
|
|
"gopkg.in/urfave/cli.v2"
|
|
"gopkg.in/yaml.v2"
|
|
|
|
"github.com/cloudflare/cloudflared/certutil"
|
|
"github.com/cloudflare/cloudflared/cmd/cloudflared/cliutil"
|
|
"github.com/cloudflare/cloudflared/cmd/cloudflared/config"
|
|
"github.com/cloudflare/cloudflared/logger"
|
|
"github.com/cloudflare/cloudflared/origin"
|
|
"github.com/cloudflare/cloudflared/tunnelrpc/pogs"
|
|
"github.com/cloudflare/cloudflared/tunnelstore"
|
|
)
|
|
|
|
const (
|
|
credFileFlagAlias = "cred-file"
|
|
)
|
|
|
|
var (
|
|
showDeletedFlag = &cli.BoolFlag{
|
|
Name: "show-deleted",
|
|
Aliases: []string{"d"},
|
|
Usage: "Include deleted tunnels in the list",
|
|
}
|
|
outputFormatFlag = &cli.StringFlag{
|
|
Name: "output",
|
|
Aliases: []string{"o"},
|
|
Usage: "Render output using given `FORMAT`. Valid options are 'json' or 'yaml'",
|
|
}
|
|
forceFlag = &cli.BoolFlag{
|
|
Name: "force",
|
|
Aliases: []string{"f"},
|
|
Usage: "By default, if a tunnel is currently being run from a cloudflared, you can't " +
|
|
"simultaneously rerun it again from a second cloudflared. The --force flag lets you " +
|
|
"overwrite the previous tunnel. If you want to use a single hostname with multiple " +
|
|
"tunnels, you can do so with Cloudflare's Load Balancer product.",
|
|
}
|
|
credentialsFileFlag = &cli.StringFlag{
|
|
Name: "credentials-file",
|
|
Aliases: []string{credFileFlagAlias},
|
|
Usage: "File path of tunnel credentials",
|
|
}
|
|
forceDeleteFlag = &cli.BoolFlag{
|
|
Name: "force",
|
|
Aliases: []string{"f"},
|
|
Usage: "Allows you to delete a tunnel, even if it has active connections.",
|
|
}
|
|
)
|
|
|
|
const hideSubcommands = true
|
|
|
|
func buildCreateCommand() *cli.Command {
|
|
return &cli.Command{
|
|
Name: "create",
|
|
Action: cliutil.ErrorHandler(createTunnel),
|
|
Usage: "Create a new tunnel with given name",
|
|
ArgsUsage: "TUNNEL-NAME",
|
|
Hidden: hideSubcommands,
|
|
Flags: []cli.Flag{outputFormatFlag},
|
|
}
|
|
}
|
|
|
|
// generateTunnelSecret as an array of 32 bytes using secure random number generator
|
|
func generateTunnelSecret() ([]byte, error) {
|
|
randomBytes := make([]byte, 32)
|
|
_, err := rand.Read(randomBytes)
|
|
return randomBytes, err
|
|
}
|
|
|
|
func createTunnel(c *cli.Context) error {
|
|
if c.NArg() != 1 {
|
|
return cliutil.UsageError(`"cloudflared tunnel create" requires exactly 1 argument, the name of tunnel to create.`)
|
|
}
|
|
name := c.Args().First()
|
|
|
|
logger, err := createLogger(c, false)
|
|
if err != nil {
|
|
return errors.Wrap(err, "error setting up logger")
|
|
}
|
|
|
|
tunnelSecret, err := generateTunnelSecret()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
cert, originCertPath, err := getOriginCertFromContext(c, logger)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
client := newTunnelstoreClient(c, cert, logger)
|
|
|
|
tunnel, err := client.CreateTunnel(name, tunnelSecret)
|
|
if err != nil {
|
|
return errors.Wrap(err, "Error creating a new tunnel")
|
|
}
|
|
|
|
if writeFileErr := writeTunnelCredentials(tunnel.ID, cert.AccountID, originCertPath, tunnelSecret, logger); err != nil {
|
|
var errorLines []string
|
|
errorLines = append(errorLines, fmt.Sprintf("Your tunnel '%v' was created with ID %v. However, cloudflared couldn't write to the tunnel credentials file at %v.json.", tunnel.Name, tunnel.ID, tunnel.ID))
|
|
errorLines = append(errorLines, fmt.Sprintf("The file-writing error is: %v", writeFileErr))
|
|
if deleteErr := client.DeleteTunnel(tunnel.ID); deleteErr != nil {
|
|
errorLines = append(errorLines, fmt.Sprintf("Cloudflared tried to delete the tunnel for you, but encountered an error. You should use `cloudflared tunnel delete %v` to delete the tunnel yourself, because the tunnel can't be run without the tunnelfile.", tunnel.ID))
|
|
errorLines = append(errorLines, fmt.Sprintf("The delete tunnel error is: %v", deleteErr))
|
|
} else {
|
|
errorLines = append(errorLines, fmt.Sprintf("The tunnel was deleted, because the tunnel can't be run without the tunnelfile"))
|
|
}
|
|
errorMsg := strings.Join(errorLines, "\n")
|
|
return errors.New(errorMsg)
|
|
}
|
|
|
|
if outputFormat := c.String(outputFormatFlag.Name); outputFormat != "" {
|
|
return renderOutput(outputFormat, &tunnel)
|
|
}
|
|
|
|
logger.Infof("Created tunnel %s with id %s", tunnel.Name, tunnel.ID)
|
|
return nil
|
|
}
|
|
|
|
func tunnelFilePath(tunnelID uuid.UUID, directory string) (string, error) {
|
|
fileName := fmt.Sprintf("%v.json", tunnelID)
|
|
filePath := filepath.Clean(fmt.Sprintf("%s/%s", directory, fileName))
|
|
return homedir.Expand(filePath)
|
|
}
|
|
|
|
func writeTunnelCredentials(tunnelID uuid.UUID, accountID, originCertPath string, tunnelSecret []byte, logger logger.Service) error {
|
|
originCertDir := filepath.Dir(originCertPath)
|
|
filePath, err := tunnelFilePath(tunnelID, originCertDir)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
body, err := json.Marshal(pogs.TunnelAuth{
|
|
AccountTag: accountID,
|
|
TunnelSecret: tunnelSecret,
|
|
})
|
|
if err != nil {
|
|
return errors.Wrap(err, "Unable to marshal tunnel credentials to JSON")
|
|
}
|
|
logger.Infof("Writing tunnel credentials to %v. cloudflared chose this file based on where your origin certificate was found.", filePath)
|
|
logger.Infof("Keep this file secret. To revoke these credentials, delete the tunnel.")
|
|
return ioutil.WriteFile(filePath, body, 400)
|
|
}
|
|
|
|
func readTunnelCredentials(c *cli.Context, tunnelID uuid.UUID, logger logger.Service) (*pogs.TunnelAuth, error) {
|
|
filePath, err := tunnelCredentialsPath(c, tunnelID, logger)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
body, err := ioutil.ReadFile(filePath)
|
|
if err != nil {
|
|
return nil, errors.Wrapf(err, "couldn't read tunnel credentials from %v", filePath)
|
|
}
|
|
|
|
var auth pogs.TunnelAuth
|
|
if err = json.Unmarshal(body, &auth); err != nil {
|
|
return nil, err
|
|
}
|
|
return &auth, nil
|
|
}
|
|
|
|
func tunnelCredentialsPath(c *cli.Context, tunnelID uuid.UUID, logger logger.Service) (string, error) {
|
|
if filePath := c.String("credentials-file"); filePath != "" {
|
|
if validFilePath(filePath) {
|
|
return filePath, nil
|
|
}
|
|
}
|
|
|
|
// Fallback to look for tunnel credentials in the origin cert directory
|
|
if originCertPath, err := findOriginCert(c, logger); err == nil {
|
|
originCertDir := filepath.Dir(originCertPath)
|
|
if filePath, err := tunnelFilePath(tunnelID, originCertDir); err == nil {
|
|
if validFilePath(filePath) {
|
|
return filePath, nil
|
|
}
|
|
}
|
|
}
|
|
|
|
// Last resort look under default config directories
|
|
for _, configDir := range config.DefaultConfigDirs {
|
|
if filePath, err := tunnelFilePath(tunnelID, configDir); err == nil {
|
|
if validFilePath(filePath) {
|
|
return filePath, nil
|
|
}
|
|
}
|
|
}
|
|
return "", fmt.Errorf("Tunnel credentials file not found")
|
|
}
|
|
|
|
func validFilePath(path string) bool {
|
|
fileStat, err := os.Stat(path)
|
|
if err != nil {
|
|
return false
|
|
}
|
|
return !fileStat.IsDir()
|
|
}
|
|
|
|
func buildListCommand() *cli.Command {
|
|
return &cli.Command{
|
|
Name: "list",
|
|
Action: cliutil.ErrorHandler(listTunnels),
|
|
Usage: "List existing tunnels",
|
|
ArgsUsage: " ",
|
|
Hidden: hideSubcommands,
|
|
Flags: []cli.Flag{outputFormatFlag, showDeletedFlag},
|
|
}
|
|
}
|
|
|
|
func listTunnels(c *cli.Context) error {
|
|
logger, err := createLogger(c, false)
|
|
if err != nil {
|
|
return errors.Wrap(err, "error setting up logger")
|
|
}
|
|
|
|
cert, _, err := getOriginCertFromContext(c, logger)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
client := newTunnelstoreClient(c, cert, logger)
|
|
|
|
allTunnels, err := client.ListTunnels()
|
|
if err != nil {
|
|
return errors.Wrap(err, "Error listing tunnels")
|
|
}
|
|
|
|
var tunnels []tunnelstore.Tunnel
|
|
if c.Bool("show-deleted") {
|
|
tunnels = allTunnels
|
|
} else {
|
|
for _, tunnel := range allTunnels {
|
|
if tunnel.DeletedAt.IsZero() {
|
|
tunnels = append(tunnels, tunnel)
|
|
}
|
|
}
|
|
}
|
|
|
|
if outputFormat := c.String(outputFormatFlag.Name); outputFormat != "" {
|
|
return renderOutput(outputFormat, tunnels)
|
|
}
|
|
|
|
if len(tunnels) > 0 {
|
|
fmtAndPrintTunnelList(tunnels)
|
|
} else {
|
|
fmt.Println("You have no tunnels, use 'cloudflared tunnel create' to define a new tunnel")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func fmtAndPrintTunnelList(tunnels []tunnelstore.Tunnel) {
|
|
const (
|
|
minWidth = 0
|
|
tabWidth = 8
|
|
padding = 1
|
|
padChar = ' '
|
|
flags = 0
|
|
)
|
|
|
|
writer := tabwriter.NewWriter(os.Stdout, minWidth, tabWidth, padding, padChar, flags)
|
|
|
|
// Print column headers with tabbed columns
|
|
fmt.Fprintln(writer, "ID\tNAME\tCREATED\tCONNECTIONS\t")
|
|
|
|
// Loop through tunnels, create formatted string for each, and print using tabwriter
|
|
for _, t := range tunnels {
|
|
formattedStr := fmt.Sprintf("%s\t%s\t%s\t%s\t", t.ID, t.Name, t.CreatedAt.Format(time.RFC3339), fmtConnections(t.Connections))
|
|
fmt.Fprintln(writer, formattedStr)
|
|
}
|
|
|
|
// Write data buffered in tabwriter to output
|
|
writer.Flush()
|
|
}
|
|
|
|
func fmtConnections(connections []tunnelstore.Connection) string {
|
|
|
|
// Count connections per colo
|
|
numConnsPerColo := make(map[string]uint, len(connections))
|
|
for _, connection := range connections {
|
|
numConnsPerColo[connection.ColoName]++
|
|
}
|
|
|
|
// Get sorted list of colos
|
|
sortedColos := []string{}
|
|
for coloName := range numConnsPerColo {
|
|
sortedColos = append(sortedColos, coloName)
|
|
}
|
|
sort.Strings(sortedColos)
|
|
|
|
// Map each colo to its frequency, combine into output string.
|
|
var output []string
|
|
for _, coloName := range sortedColos {
|
|
output = append(output, fmt.Sprintf("%dx%s", numConnsPerColo[coloName], coloName))
|
|
}
|
|
return strings.Join(output, ", ")
|
|
}
|
|
|
|
func buildDeleteCommand() *cli.Command {
|
|
return &cli.Command{
|
|
Name: "delete",
|
|
Action: cliutil.ErrorHandler(deleteTunnel),
|
|
Usage: "Delete existing tunnel with given ID",
|
|
ArgsUsage: "TUNNEL-ID",
|
|
Hidden: hideSubcommands,
|
|
Flags: []cli.Flag{credentialsFileFlag, forceDeleteFlag},
|
|
}
|
|
}
|
|
|
|
func deleteTunnel(c *cli.Context) error {
|
|
if c.NArg() != 1 {
|
|
return cliutil.UsageError(`"cloudflared tunnel delete" requires exactly 1 argument, the ID of the tunnel to delete.`)
|
|
}
|
|
tunnelID, err := uuid.Parse(c.Args().First())
|
|
if err != nil {
|
|
return errors.Wrap(err, "error parsing tunnel ID")
|
|
}
|
|
|
|
logger, err := createLogger(c, false)
|
|
if err != nil {
|
|
return errors.Wrap(err, "error setting up logger")
|
|
}
|
|
|
|
cert, _, err := getOriginCertFromContext(c, logger)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
client := newTunnelstoreClient(c, cert, logger)
|
|
|
|
forceFlagSet := c.Bool("force")
|
|
|
|
tunnel, err := client.GetTunnel(tunnelID)
|
|
if err != nil {
|
|
return errors.Wrapf(err, "Can't get tunnel information. Please check tunnel id: %s", tunnelID)
|
|
}
|
|
|
|
// Check if tunnel DeletedAt field has already been set
|
|
if !tunnel.DeletedAt.IsZero() {
|
|
return errors.New("This tunnel has already been deleted.")
|
|
}
|
|
// Check if tunnel has existing connections and if force flag is set, cleanup connections
|
|
if len(tunnel.Connections) > 0 {
|
|
if !forceFlagSet {
|
|
return errors.New("You can not delete this tunnel because it has active connections. To see connections run the 'list' command. If you believe the tunnel is not active, you can use a -f / --force flag with this command.")
|
|
}
|
|
|
|
if err := client.CleanupConnections(tunnelID); err != nil {
|
|
return errors.Wrapf(err, "Error cleaning up connections for tunnel %s", tunnelID)
|
|
}
|
|
}
|
|
|
|
if err := client.DeleteTunnel(tunnelID); err != nil {
|
|
return errors.Wrapf(err, "Error deleting tunnel %s", tunnelID)
|
|
}
|
|
|
|
tunnelCredentialsPath, err := tunnelCredentialsPath(c, tunnelID, logger)
|
|
if err != nil {
|
|
logger.Infof("Cannot locate tunnel credentials to delete, error: %v. Please delete the file manually", err)
|
|
return nil
|
|
}
|
|
|
|
if err = os.Remove(tunnelCredentialsPath); err != nil {
|
|
logger.Infof("Cannot delete tunnel credentials, error: %v. Please delete the file manually", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func renderOutput(format string, v interface{}) error {
|
|
switch format {
|
|
case "json":
|
|
encoder := json.NewEncoder(os.Stdout)
|
|
encoder.SetIndent("", " ")
|
|
return encoder.Encode(v)
|
|
case "yaml":
|
|
return yaml.NewEncoder(os.Stdout).Encode(v)
|
|
default:
|
|
return errors.Errorf("Unknown output format '%s'", format)
|
|
}
|
|
}
|
|
|
|
func newTunnelstoreClient(c *cli.Context, cert *certutil.OriginCert, logger logger.Service) tunnelstore.Client {
|
|
client := tunnelstore.NewRESTClient(c.String("api-url"), cert.AccountID, cert.ZoneID, cert.ServiceKey, logger)
|
|
return client
|
|
}
|
|
|
|
func getOriginCertFromContext(c *cli.Context, logger logger.Service) (cert *certutil.OriginCert, originCertPath string, err error) {
|
|
originCertPath, err = findOriginCert(c, logger)
|
|
if err != nil {
|
|
return nil, "", errors.Wrap(err, "Error locating origin cert")
|
|
}
|
|
blocks, err := readOriginCert(originCertPath, logger)
|
|
if err != nil {
|
|
return nil, "", errors.Wrapf(err, "Can't read origin cert from %s", originCertPath)
|
|
}
|
|
|
|
cert, err = certutil.DecodeOriginCert(blocks)
|
|
if err != nil {
|
|
return nil, "", errors.Wrap(err, "Error decoding origin cert")
|
|
}
|
|
|
|
if cert.AccountID == "" {
|
|
return nil, "", errors.Errorf(`Origin certificate needs to be refreshed before creating new tunnels.\nDelete %s and run "cloudflared login" to obtain a new cert.`, originCertPath)
|
|
}
|
|
return cert, originCertPath, nil
|
|
}
|
|
|
|
func buildRunCommand() *cli.Command {
|
|
return &cli.Command{
|
|
Name: "run",
|
|
Action: cliutil.ErrorHandler(runTunnel),
|
|
Usage: "Proxy a local web server by running the given tunnel",
|
|
ArgsUsage: "TUNNEL-ID",
|
|
Hidden: hideSubcommands,
|
|
Flags: []cli.Flag{forceFlag, credentialsFileFlag},
|
|
}
|
|
}
|
|
|
|
func runTunnel(c *cli.Context) error {
|
|
if c.NArg() != 1 {
|
|
return cliutil.UsageError(`"cloudflared tunnel run" requires exactly 1 argument, the ID of the tunnel to run.`)
|
|
}
|
|
|
|
tunnelID, err := uuid.Parse(c.Args().First())
|
|
if err != nil {
|
|
return errors.Wrap(err, "error parsing tunnel ID")
|
|
}
|
|
|
|
logger, err := createLogger(c, false)
|
|
if err != nil {
|
|
return errors.Wrap(err, "error setting up logger")
|
|
}
|
|
|
|
credentials, err := readTunnelCredentials(c, tunnelID, logger)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
logger.Debugf("Read credentials for %v", credentials.AccountTag)
|
|
return StartServer(c, version, shutdownC, graceShutdownC, &origin.NamedTunnelConfig{Auth: *credentials, ID: tunnelID})
|
|
}
|
|
|
|
func buildCleanupCommand() *cli.Command {
|
|
return &cli.Command{
|
|
Name: "cleanup",
|
|
Action: cliutil.ErrorHandler(cleanupConnections),
|
|
Usage: "Cleanup connections for the tunnel with given IDs",
|
|
ArgsUsage: "TUNNEL-IDS",
|
|
Hidden: hideSubcommands,
|
|
}
|
|
}
|
|
|
|
func cleanupConnections(c *cli.Context) error {
|
|
if c.NArg() < 1 {
|
|
return cliutil.UsageError(`"cloudflared tunnel cleanup" requires at least 1 argument, the IDs of the tunnels to cleanup connections.`)
|
|
}
|
|
|
|
logger, err := createLogger(c, false)
|
|
if err != nil {
|
|
return errors.Wrap(err, "error setting up logger")
|
|
}
|
|
|
|
cert, _, err := getOriginCertFromContext(c, logger)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
client := newTunnelstoreClient(c, cert, logger)
|
|
|
|
for i := 0; i < c.NArg(); i++ {
|
|
tunnelID, err := uuid.Parse(c.Args().Get(i))
|
|
if err != nil {
|
|
logger.Errorf("Failed to parse argument %d as tunnelID, error :%v", i, err)
|
|
continue
|
|
}
|
|
logger.Infof("Cleanup connection for tunnel %s", tunnelID)
|
|
if err := client.CleanupConnections(tunnelID); err != nil {
|
|
logger.Errorf("Error cleaning up connections for tunnel %v, error :%v", tunnelID, err)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func buildRouteCommand() *cli.Command {
|
|
return &cli.Command{
|
|
Name: "route",
|
|
Action: cliutil.ErrorHandler(routeTunnel),
|
|
Usage: "Define what hostname or load balancer can route to this tunnel",
|
|
Description: `The route defines what hostname or load balancer can route to this tunnel.
|
|
To route a hostname: cloudflared tunnel route dns <tunnel ID> <hostname>
|
|
To route a load balancer: cloudflared tunnel route lb <tunnel ID> <load balancer name> <load balancer pool>
|
|
If you don't specify a load balancer pool, we will create a new pool called tunnel:<tunnel ID>`,
|
|
ArgsUsage: "dns|lb TUNNEL-ID HOSTNAME [LB-POOL]",
|
|
Hidden: hideSubcommands,
|
|
}
|
|
}
|
|
|
|
func routeTunnel(c *cli.Context) error {
|
|
if c.NArg() < 2 {
|
|
return cliutil.UsageError(`"cloudflared tunnel route" requires the first argument to be the route type(dns or lb), followed by the ID of the tunnel`)
|
|
}
|
|
const tunnelIDIndex = 1
|
|
tunnelID, err := uuid.Parse(c.Args().Get(tunnelIDIndex))
|
|
if err != nil {
|
|
return errors.Wrap(err, "error parsing tunnel ID")
|
|
}
|
|
|
|
logger, err := createLogger(c, false)
|
|
if err != nil {
|
|
return errors.Wrap(err, "error setting up logger")
|
|
}
|
|
|
|
routeType := c.Args().First()
|
|
var route tunnelstore.Route
|
|
switch routeType {
|
|
case "dns":
|
|
route, err = dnsRouteFromArg(c, tunnelID)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
case "lb":
|
|
route, err = lbRouteFromArg(c, tunnelID, logger)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
default:
|
|
return cliutil.UsageError("%s is not a recognized route type. Supported route types are dns and lb", routeType)
|
|
}
|
|
|
|
cert, _, err := getOriginCertFromContext(c, logger)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
client := newTunnelstoreClient(c, cert, logger)
|
|
|
|
if err := client.RouteTunnel(tunnelID, route); err != nil {
|
|
return errors.Wrap(err, "Failed to route tunnel")
|
|
}
|
|
|
|
logger.Infof(route.SuccessSummary())
|
|
|
|
return nil
|
|
}
|
|
|
|
func dnsRouteFromArg(c *cli.Context, tunnelID uuid.UUID) (tunnelstore.Route, error) {
|
|
const (
|
|
userHostnameIndex = 2
|
|
expectArgs = 3
|
|
)
|
|
if c.NArg() != expectArgs {
|
|
return nil, cliutil.UsageError("Expect %d arguments, got %d", expectArgs, c.NArg())
|
|
}
|
|
userHostname := c.Args().Get(userHostnameIndex)
|
|
if userHostname == "" {
|
|
return nil, cliutil.UsageError("The third argument should be the hostname")
|
|
}
|
|
return tunnelstore.NewDNSRoute(userHostname), nil
|
|
}
|
|
|
|
func lbRouteFromArg(c *cli.Context, tunnelID uuid.UUID, logger logger.Service) (tunnelstore.Route, error) {
|
|
const (
|
|
lbNameIndex = 2
|
|
lbPoolIndex = 3
|
|
expectMinArgs = 3
|
|
)
|
|
if c.NArg() < expectMinArgs {
|
|
return nil, cliutil.UsageError("Expect at least %d arguments, got %d", expectMinArgs, c.NArg())
|
|
}
|
|
lbName := c.Args().Get(lbNameIndex)
|
|
if lbName == "" {
|
|
return nil, cliutil.UsageError("The third argument should be the load balancer name")
|
|
}
|
|
lbPool := c.Args().Get(lbPoolIndex)
|
|
if lbPool == "" {
|
|
lbPool = fmt.Sprintf("tunnel:%v", tunnelID)
|
|
logger.Infof("Generate pool name %s", lbPool)
|
|
}
|
|
|
|
return tunnelstore.NewLBRoute(lbName, lbPool), nil
|
|
}
|