working cleanup
This commit is contained in:
		
							parent
							
								
									de1bea7b60
								
							
						
					
					
						commit
						30d1ce89fe
					
				| @ -3,6 +3,7 @@ | ||||
| 'use strict'; | ||||
| 
 | ||||
| var pkg = require('../package.json'); | ||||
| console.log(pkg.name, pkg.version); | ||||
| 
 | ||||
| var url = require('url'); | ||||
| var remote = require('../remote.js'); | ||||
| @ -37,7 +38,12 @@ function help() { | ||||
|   process.exit(0); | ||||
| } | ||||
| 
 | ||||
| if (-1 === confIndex || -1 !== argv.indexOf('-h') || -1 !== argv.indexOf('--help')) { | ||||
| if (-1 === confIndex) { | ||||
|   confpath = require('path').join(require('os').homedir(), '.config/telebit/telebit.yml'); | ||||
|   console.info('Using default --config "' + confpath + '"'); | ||||
| } | ||||
| 
 | ||||
| if (-1 !== argv.indexOf('-h') || -1 !== argv.indexOf('--help')) { | ||||
|   help(); | ||||
| } | ||||
| if (!confpath || /^--/.test(confpath)) { | ||||
| @ -74,7 +80,6 @@ require('fs').readFile(confpath, 'utf8', function (err, text) { | ||||
| }); | ||||
| 
 | ||||
| function connectTunnel() { | ||||
|   var services = { https: {}, http: {}, tcp: {} }; | ||||
|   state.net = { | ||||
|     createConnection: function (info, cb) { | ||||
|       // data is the hello packet / first chunk
 | ||||
| @ -86,66 +91,17 @@ function connectTunnel() { | ||||
|     } | ||||
|   }; | ||||
| 
 | ||||
|   // Note: the remote needs to know:
 | ||||
|   //   what servernames to forward
 | ||||
|   //   what ports to forward
 | ||||
|   //   what udp ports to forward
 | ||||
|   //   redirect http to https automatically
 | ||||
|   //   redirect www to nowww automatically
 | ||||
|   if (state.config.http) { | ||||
|     Object.keys(state.config.http).forEach(function (hostname) { | ||||
|       if ('*' === hostname) { | ||||
|         state.config.servernames.forEach(function (servername) { | ||||
|           services.https[servername] = state.config.http[hostname]; | ||||
|           services.http[servername] = 'redirect-https'; | ||||
|         }); | ||||
|         return; | ||||
|       } | ||||
|       services.https[hostname] = state.config.http[hostname]; | ||||
|       services.http[hostname] = 'redirect-https'; | ||||
|     }); | ||||
|   } | ||||
|   /* | ||||
|   Object.keys(state.config.localPorts).forEach(function (port) { | ||||
|     var proto = state.config.localPorts[port]; | ||||
|     if (!proto) { return; } | ||||
|     if ('http' === proto) { | ||||
|       state.config.servernames.forEach(function (servername) { | ||||
|         services.http[servername] = port; | ||||
|       }); | ||||
|       return; | ||||
|     } | ||||
|     if ('https' === proto) { | ||||
|       state.config.servernames.forEach(function (servername) { | ||||
|         services.https[servername] = port; | ||||
|       }); | ||||
|       return; | ||||
|     } | ||||
|     if (true === proto) { proto = 'tcp'; } | ||||
|     if ('tcp' !== proto) { throw new Error("unsupported protocol '" + proto + "'"); } | ||||
|     //services[proxy.protocol]['*'] = proxy.port;
 | ||||
|     //services[proxy.protocol][proxy.hostname] = proxy.port;
 | ||||
|     services[proto]['*'] = port; | ||||
|   }); | ||||
|   */ | ||||
|   state.services = services; | ||||
| 
 | ||||
|   Object.keys(services).forEach(function (protocol) { | ||||
|     var subServices = state.services[protocol]; | ||||
|     Object.keys(subServices).forEach(function (hostname) { | ||||
|       console.info('[local proxy]', protocol + '://' + hostname + ' => ' + subServices[hostname]); | ||||
|     }); | ||||
|   }); | ||||
|   console.info(''); | ||||
| 
 | ||||
|   state.greenlock = state.config.greenlock || {}; | ||||
|   if (!state.config.sortingHat) { | ||||
|     state.config.sortingHat = './lib/sorting-hat.js'; | ||||
|   } | ||||
|   state.config.sortingHat = require('path').resolve(__dirname, '..', state.config.sortingHat); | ||||
| 
 | ||||
|   // TODO Check undefined vs false for greenlock config
 | ||||
|   var tun = remote.connect({ | ||||
|     relay: state.config.relay | ||||
|   , config: state.config | ||||
|   , sortingHat: state.config.sortingHat || './lib/sorting-hat.js' | ||||
|   , locals: state.config.servernames | ||||
|   , services: state.services | ||||
|   , sortingHat: state.config.sortingHat | ||||
|   , net: state.net | ||||
|   , insecure: state.config.relay_ignore_invalid_certificates | ||||
|   , token: state.token | ||||
| @ -157,6 +113,7 @@ function connectTunnel() { | ||||
|     , configDir: state.greenlock.configDir || '~/acme/etc/' | ||||
|     // TODO, store: require(state.greenlock.store.name || 'le-store-certbot').create(state.greenlock.store.options || {})
 | ||||
|     , approveDomains: function (opts, certs, cb) { | ||||
|         console.log("trying approve domains"); | ||||
|         // Certs being renewed are listed in certs.altnames
 | ||||
|         if (certs) { | ||||
|           opts.domains = certs.altnames; | ||||
| @ -164,16 +121,22 @@ function connectTunnel() { | ||||
|           return; | ||||
|         } | ||||
| 
 | ||||
|         if (-1 !== state.config.servernames.indexOf(opts.domains[0])) { | ||||
|         // by virtue of the fact that it's being tunneled through a
 | ||||
|         // trusted source that is already checking, we're good
 | ||||
|         //if (-1 !== state.config.servernames.indexOf(opts.domains[0])) {
 | ||||
|           opts.email = state.greenlock.email || state.config.email; | ||||
|           opts.agreeTos = state.greenlock.agree || state.agreeTos; | ||||
|           cb(null, { options: opts, certs: certs }); | ||||
|           return; | ||||
|         } | ||||
|         //}
 | ||||
| 
 | ||||
|         //cb(new Error("servername not found in allowed list"));
 | ||||
|       } | ||||
|     } | ||||
|   }); | ||||
| 
 | ||||
|   require(state.config.sortingHat).print(state.config); | ||||
| 
 | ||||
|   function sigHandler() { | ||||
|     console.log('SIGINT'); | ||||
| 
 | ||||
| @ -208,7 +171,7 @@ function rawTunnel() { | ||||
|   if (!state.config.token) { | ||||
|     var jwt = require('jsonwebtoken'); | ||||
|     var tokenData = { | ||||
|       domains: state.config.servernames | ||||
|       domains: Object.keys(state.config.servernames).filter(function (name) { return /\./.test(name); }) | ||||
|     , aud: aud | ||||
|     , iss: Math.round(Date.now() / 1000) | ||||
|     }; | ||||
|  | ||||
| @ -1,16 +1,185 @@ | ||||
| module.exports.print = function (config) { | ||||
|   var services = { https: {}, http: {}, tcp: {} }; | ||||
|   // Note: the remote needs to know:
 | ||||
|   //   what servernames to forward
 | ||||
|   //   what ports to forward
 | ||||
|   //   what udp ports to forward
 | ||||
|   //   redirect http to https automatically
 | ||||
|   //   redirect www to nowww automatically
 | ||||
|   if (config.http) { | ||||
|     Object.keys(config.http).forEach(function (hostname) { | ||||
|       if ('*' === hostname) { | ||||
|         config.servernames.forEach(function (servername) { | ||||
|           services.https[servername] = config.http[hostname]; | ||||
|           services.http[servername] = 'redirect-https'; | ||||
|         }); | ||||
|         return; | ||||
|       } | ||||
|       services.https[hostname] = config.http[hostname]; | ||||
|       services.http[hostname] = 'redirect-https'; | ||||
|     }); | ||||
|   } | ||||
|   /* | ||||
|   Object.keys(config.localPorts).forEach(function (port) { | ||||
|     var proto = config.localPorts[port]; | ||||
|     if (!proto) { return; } | ||||
|     if ('http' === proto) { | ||||
|       config.servernames.forEach(function (servername) { | ||||
|         services.http[servername] = port; | ||||
|       }); | ||||
|       return; | ||||
|     } | ||||
|     if ('https' === proto) { | ||||
|       config.servernames.forEach(function (servername) { | ||||
|         services.https[servername] = port; | ||||
|       }); | ||||
|       return; | ||||
|     } | ||||
|     if (true === proto) { proto = 'tcp'; } | ||||
|     if ('tcp' !== proto) { throw new Error("unsupported protocol '" + proto + "'"); } | ||||
|   //services[proxy.protocol]['*'] = proxy.port;
 | ||||
|   //services[proxy.protocol][proxy.hostname] = proxy.port;
 | ||||
|     services[proto]['*'] = port; | ||||
|   }); | ||||
|   */ | ||||
| 
 | ||||
|   Object.keys(services).forEach(function (protocol) { | ||||
|     var subServices = services[protocol]; | ||||
|     Object.keys(subServices).forEach(function (hostname) { | ||||
|       console.info('[local proxy]', protocol + '://' + hostname + ' => ' + subServices[hostname]); | ||||
|     }); | ||||
|   }); | ||||
|   console.info(''); | ||||
| }; | ||||
| 
 | ||||
| module.exports.assign = function (state, tun, cb) { | ||||
|   var net = state.net || require('net'); | ||||
|   var service = tun.service.toLowerCase(); | ||||
|   var portList = state.services[service]; | ||||
|   var port; | ||||
| 
 | ||||
|   if (!tun.name && !tun.serviceport) { | ||||
|     console.log('tun:\n',tun); | ||||
|     //console.warn(tun.data.toString());
 | ||||
|     cb(new Error("missing routing information for ':tun_id'")); | ||||
|     cb(new Error("No routing information for ':tun_id'. Missing both 'name' and 'serviceport'.")); | ||||
|     return; | ||||
|   } | ||||
| 
 | ||||
|   if (!state.config.servernames) { | ||||
|     state.config.servernames = {}; | ||||
|   } | ||||
| 
 | ||||
|   var handlers = {}; | ||||
|   handlers.http = function (socket) { | ||||
|     if (!state.greenlock) { | ||||
|       state.greenlock = require('greenlock').create(state.greenlockConfig); | ||||
|     } | ||||
|     if (!state.httpRedirectServer) { | ||||
|       state.redirectHttps = require('redirect-https')(); | ||||
|       state.httpRedirectServer = require('http').createServer(state.greenlock.middleware(state.redirectHttps)); | ||||
|     } | ||||
|     state.httpRedirectServer.emit('connection', socket); | ||||
|   }; | ||||
|   handlers.https = function (tlsSocket) { | ||||
|     if (!state.defaultHttpServer) { | ||||
|       state.defaultHttpServer = require('http').createServer(function (req, res) { | ||||
|         console.log('[hit http/s server]'); | ||||
|         res.end('Hello, Encrypted Tunnel World!'); | ||||
|       }); | ||||
|     } | ||||
|     state.defaultHttpServer.emit('connection', tlsSocket); | ||||
|   }; | ||||
| 
 | ||||
|   if ('http' === tun.service || 'https' === tun.service) { | ||||
|     if (!tun.name) { | ||||
|       cb(new Error("No routing information for ':tun_id'. Service '" + tun.service + "' is missing 'name'.")); | ||||
|       return; | ||||
|     } | ||||
|   } | ||||
| 
 | ||||
|   function redirectHttp(cb) { | ||||
|     var socketPair = require('socket-pair'); | ||||
|     conn = socketPair.create(function (err, other) { | ||||
|       if (err) { cb(err); return; } | ||||
|       handlers.http(other); | ||||
|       cb(null, conn); | ||||
|     }); | ||||
|     //if (tun.data) { conn.write(tun.data); }
 | ||||
|     return conn; | ||||
|   } | ||||
| 
 | ||||
|   var handled; | ||||
| 
 | ||||
|   if ('http' === tun.service) { | ||||
|     // TODO match *.example.com
 | ||||
|     handled = Object.keys(state.config.servernames).some(function (sn) { | ||||
|       if (sn !== tun.name) { return; } | ||||
| 
 | ||||
|       console.log('Found config match for PLAIN', tun.name); | ||||
|       if (!state.config.servernames[sn]) { return; } | ||||
| 
 | ||||
|       if (false === state.config.servernames[sn].terminate) { | ||||
|         cb(new Error("insecure http not supported yet")); | ||||
|         return true; | ||||
|       } | ||||
| 
 | ||||
|       console.log('Redirecting HTPTP for', tun.name); | ||||
|       redirectHttp(cb); | ||||
|       return true; | ||||
|     }); | ||||
|     if (!handled) { | ||||
|       redirectHttp(cb); | ||||
|     } | ||||
|     return; | ||||
|   } | ||||
| 
 | ||||
|   function terminateTls(cb) { | ||||
|     var socketPair = require('socket-pair'); | ||||
|     conn = socketPair.create(function (err, other) { | ||||
|       if (err) { cb(err); return; } | ||||
| 
 | ||||
|       if (!state.greenlock) { | ||||
|         state.greenlock = require('greenlock').create(state.greenlockConfig); | ||||
|       } | ||||
|       if (!state.terminatorServer) { | ||||
|         state.terminatorServer = require('tls').createServer(state.greenlock.tlsOptions, function (tlsSocket) { | ||||
|           console.log('[hit tls server]'); | ||||
|           if (err) { cb(err); return; } | ||||
|           handlers.https(tlsSocket); | ||||
|         }); | ||||
|       } | ||||
| 
 | ||||
|       console.log('[emitting tls connection]'); | ||||
|       state.terminatorServer.emit('connection', other); | ||||
|       cb(null, conn); | ||||
|     }); | ||||
|     //if (tun.data) { conn.write(tun.data); }
 | ||||
|     return conn; | ||||
|   } | ||||
| 
 | ||||
|   if ('https' === tun.service) { | ||||
|     // TODO match *.example.com
 | ||||
|     handled = Object.keys(state.config.servernames).some(function (sn) { | ||||
|       if (sn !== tun.name) { return; } | ||||
| 
 | ||||
|       console.log('Found config match for TLS', tun.name); | ||||
|       if (!state.config.servernames[sn]) { return; } | ||||
| 
 | ||||
|       if (false === state.config.servernames[sn].terminate) { | ||||
|         cb(new Error("insecure http not supported yet")); | ||||
|         return true; | ||||
|       } | ||||
| 
 | ||||
|       console.log('Terminating TLS for', tun.name); | ||||
|       terminateTls(cb); | ||||
|       return true; | ||||
|     }); | ||||
|     if (!handled) { | ||||
|       terminateTls(cb); | ||||
|     } | ||||
|     return; | ||||
|   } | ||||
| 
 | ||||
|   return; | ||||
|   var portList = state.services[service]; | ||||
|   var port; | ||||
|   port = portList[tun.name]; | ||||
|   if (!port) { | ||||
|     // Check for any wildcard domains, sorted longest to shortest so the one with the
 | ||||
| @ -48,7 +217,7 @@ module.exports.assign = function (state, tun, cb) { | ||||
|   function handleNow(socket) { | ||||
|     var httpServer; | ||||
|     var tlsServer; | ||||
|     if ('https' === service) { | ||||
|     if ('https' === tun.service) { | ||||
|       if (!state.greenlock) { | ||||
|         state.greenlock = require('greenlock').create(state.greenlockConfig); | ||||
|       } | ||||
| @ -77,9 +246,7 @@ module.exports.assign = function (state, tun, cb) { | ||||
|     conn = socketPair.create(function (err, other) { | ||||
|       if (err) { console.error('[Error] ' + err.message); } | ||||
|       handleNow(other); | ||||
|       if (createOpts.data) { | ||||
|         conn.write(createOpts.data); | ||||
|       } | ||||
|       //if (createOpts.data) { conn.write(createOpts.data); }
 | ||||
|     }); | ||||
|     /* | ||||
|     var streamPair = require('stream-pair'); | ||||
| @ -96,9 +263,7 @@ module.exports.assign = function (state, tun, cb) { | ||||
|       // this will happen before 'data' or 'readable' is triggered
 | ||||
|       // We use the data from the createOpts object so that the createConnection function has
 | ||||
|       // the oppurtunity of removing/changing it if it wants/needs to handle it differently.
 | ||||
|       if (createOpts.data) { | ||||
|         conn.write(createOpts.data); | ||||
|       } | ||||
|       //if (createOpts.data) { conn.write(createOpts.data); }
 | ||||
|     }); | ||||
|   } | ||||
|   cb(null, conn); | ||||
|  | ||||
| @ -52,11 +52,11 @@ | ||||
|     "greenlock": "^2.2.19", | ||||
|     "js-yaml": "^3.11.0", | ||||
|     "jsonwebtoken": "^7.1.9", | ||||
|     "proxy-packer": "^1.4.3", | ||||
|     "recase": "^1.0.4", | ||||
|     "redirect-https": "^1.1.5", | ||||
|     "sni": "^1.0.0", | ||||
|     "socket-pair": "^1.0.3", | ||||
|     "proxy-packer": "^1.4.3", | ||||
|     "ws": "^2.2.3" | ||||
|   } | ||||
| } | ||||
|  | ||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user