Compare commits

..

50 Commits

Author SHA1 Message Date
bel 057a0ab341 to bel.blue 2025-11-20 17:56:06 -07:00
Bel LaPointe b6422eb0c0 support tcp AND ssl 2025-11-20 17:15:22 -07:00
Bel LaPointe 4a0e3c15e9 mto bel.blue thanks render 2025-11-20 17:14:50 -07:00
bel 3b53ef938d build.sh 2025-11-20 08:47:54 -07:00
bel 40d95d5b63 fix tests 2025-11-20 08:29:11 -07:00
bel 2ff12869cd impl cidr as password:CIDR:http://target 2025-11-20 08:28:25 -07:00
bel 9791f80b28 shhhh 2025-06-19 17:03:01 -06:00
bel 8d018aa236 oh 2025-06-19 16:56:52 -06:00
bel 00eda1e419 hrm 2025-06-19 16:52:36 -06:00
bel 5a0f567da3 _ lists 2025-06-19 16:49:06 -06:00
bel e4451923e9 whatevs 2024-12-21 13:50:53 -07:00
bel 4211b238c5 X-Forwarded-Proto 2024-12-21 13:48:57 -07:00
bel 5ab41100fb Merge branch 'master' of https://gitea.inhome.blapointe.com/local/rproxy3 2024-12-21 13:44:47 -07:00
bel 66f2a4df94 passthrough basic auth if not configred at rproxy3 level 2024-04-01 06:46:27 -06:00
Bel LaPointe dee04b6962 ewwww broke passthrough basic auth 2024-04-01 06:45:31 -06:00
Bel LaPointe 87d95b4eff Merge branch 'master' of https://gitea.inhome.blapointe.com/local/rproxy3 2024-04-01 06:44:15 -06:00
bel f083763f1d there we go 2024-03-10 11:17:48 -06:00
bel abf628d2bb proxy2 does auth inline 2024-03-10 11:08:51 -06:00
bel fb6d7af6d3 from gogs to gitea 2024-03-10 09:54:05 -06:00
bel 9941706b73 trivial 2024-03-10 09:51:29 -06:00
Bel LaPointe 669f3283f4 from gogs 2024-01-09 08:05:16 -07:00
Bel LaPointe fb30cc8436 to gogs.inhome 2023-04-10 11:18:10 -06:00
bel c8330aab26 NOW go mod 2022-10-25 22:42:05 -06:00
bel 32891c518c go mod 2022-10-25 22:40:00 -06:00
bel 00591f5dde meta access log to stdout 2022-05-26 20:04:00 -06:00
bel 56a74a2767 add access log 2022-05-26 20:03:35 -06:00
bel 0eea3e787c ifnot proxied, then call WriteHeader to ensure CORS 2022-05-26 19:34:12 -06:00
bel 38f19408c2 cors ensures only ONE access control allow origin header set 2022-05-26 19:04:28 -06:00
Bel LaPointe f28211e722 impl trim 2022-01-11 15:58:27 -05:00
Bel LaPointe ef3abbbf07 authelia attempt failed 2021-04-18 12:20:19 -05:00
Bel LaPointe af240639cb backend gets cookie identifying user 2021-03-21 13:12:11 -05:00
Bel LaPointe c623792c2f NOW authelia supported 2021-03-21 13:03:04 -05:00
Bel LaPointe cebb518e05 impl authelia I think 2021-03-21 12:44:21 -05:00
Bel LaPointe 177e0d88da dont rewrite 2020-07-31 23:15:58 -06:00
Bel LaPointe 9b0bccd9ca CORS for DELETE 2020-07-25 19:32:59 -06:00
Bel LaPointe 1af274dc1d Add redirect things for dumb js apps 2020-07-25 02:28:57 -06:00
Bel LaPointe ec1e0cdf2e Add nopath for vue things 2020-07-25 02:23:04 -06:00
Bel LaPointe 61811e8e61 Listen on second port and redirect to main 2020-02-14 14:57:26 -07:00
bel c4c37068f3 New oauth2client 2019-12-31 11:21:15 -07:00
bel d71b00e067 Fix 2019-11-06 19:00:56 -07:00
Bel LaPointe d98703610d remove unused and rename 2019-11-03 07:56:43 -07:00
Bel LaPointe 01b7b06971 Optional oauth via + flag 2019-11-03 07:55:38 -07:00
Bel LaPointe 7d3d6d88f6 Re-enable config files 2019-11-03 07:45:23 -07:00
Bel LaPointe 8c415f2a39 Update to scoped oauth 2019-11-02 08:03:35 -06:00
Bel LaPointe df0232e24c Create dockerfile from dockerize.do and test WS 2019-11-02 07:26:58 -06:00
bel bc11dd7f82 change conf to argsset and flag for oauth 2019-10-22 05:03:53 +00:00
bel e20ba5361d about to replace config and storage with shared package 2019-10-22 02:36:59 +00:00
Bel LaPointe 8a90a3adda Implement tcp proxy with single forward 2019-10-02 09:07:59 -06:00
Bel LaPointe 698edf7e45 insecure skip verify 2019-09-24 12:47:06 -06:00
Bel LaPointe 48e0048216 no more logger 2019-05-02 09:35:53 -06:00
34 changed files with 747 additions and 411 deletions

4
.gitignore vendored Normal file → Executable file
View File

@ -1,6 +1,10 @@
lz4 lz4
rclone rclone
rcloner rcloner
exec
exec-*
**/exec
**/exec-*
Go Go
cloudly cloudly
dockfile dockfile

16
Dockerfile Executable file
View File

@ -0,0 +1,16 @@
FROM golang:1.13-alpine as certs
RUN apk update && apk add --no-cache ca-certificates
FROM busybox:glibc
RUN mkdir -p /var/log
WORKDIR /main
COPY --from=certs /etc/ssl/certs /etc/ssl/certs
COPY . .
ENV GOPATH=""
ENV MNT="/mnt/"
ENTRYPOINT ["/main/exec-rproxy3"]
CMD []

5
build.sh Normal file
View File

@ -0,0 +1,5 @@
#! /usr/bin/env bash
export CGO_ENABLED=1
export CC=x86_64-linux-musl-gcc
exec go build -ldflags="-linkmode external -extldflags '-static'" -o exec-rproxy3

View File

@ -1,11 +0,0 @@
p: 54243
r:
- echo:http://localhost:49982
- echo2:http://192.168.0.86:38090
#crt: ./testdata/rproxy3server.crt
#key: ./testdata/rproxy3server.key
#user: bel
#pass: bel
rate: 1
burst: 2
timeout: 10

185
config/config.go Normal file → Executable file
View File

@ -1,118 +1,129 @@
package config package config
import ( import (
"local/rproxy3/storage/packable" "encoding/json"
"fmt"
"log" "log"
"strconv" "regexp"
"strings" "strings"
"time"
"gopkg.in/yaml.v2"
) )
func GetPort() string { type Proxy struct {
v := packable.NewString() Auth string
conf.Get(nsConf, flagPort, v) From string
return ":" + strings.TrimPrefix(v.String(), ":") To string
} }
func GetRoutes() map[string]string { func parseOneProxyCSV(s string) (string, Proxy) {
v := packable.NewString() p := Proxy{}
conf.Get(nsConf, flagRoutes, v) key := ""
m := make(map[string]string) l := strings.Split(s, ",")
for _, v := range strings.Split(v.String(), ",") { if len(l) > 0 {
if len(v) == 0 { key = l[0]
return m
}
from := v[:strings.Index(v, ":")]
to := v[strings.Index(v, ":")+1:]
m[from] = to
} }
return m if len(l) > 1 {
} p.To = l[1]
}
func GetSSL() (string, string, bool) { return key, p
v := packable.NewString()
conf.Get(nsConf, flagCert, v)
certPath := v.String()
conf.Get(nsConf, flagKey, v)
keyPath := v.String()
return certPath, keyPath, notEmpty(certPath, keyPath)
} }
func GetAuth() (string, string, bool) { func GetAuth() (string, string, bool) {
v := packable.NewString() user := conf.Get("user").GetString()
conf.Get(nsConf, flagUser, v) pass := conf.Get("pass").GetString()
user := v.String() return user, pass, user != "" && pass != ""
conf.Get(nsConf, flagPass, v)
pass := v.String()
return user, pass, notEmpty(user, pass)
} }
func notEmpty(s ...string) bool { func GetTrim() string {
for i := range s { return conf.Get("trim").GetString()
if s[i] == "" || s[i] == "/dev/null" { }
return false
} func GetPort() string {
} port := conf.Get("p").GetInt()
return true return ":" + fmt.Sprint(port)
}
func GetAltPort() string {
port := conf.Get("ap").GetInt()
return ":" + fmt.Sprint(port)
} }
func GetRate() (int, int) { func GetRate() (int, int) {
r := packable.NewString() rate := conf.Get("r").GetInt()
conf.Get(nsConf, flagRate, r) burst := conf.Get("b").GetInt()
b := packable.NewString() log.Println("rate/burst:", rate, burst)
conf.Get(nsConf, flagBurst, b)
rate, err := strconv.Atoi(r.String())
if err != nil {
log.Printf("illegal rate: %v", err)
rate = 5
}
burst, _ := strconv.Atoi(b.String())
if err != nil {
log.Printf("illegal burst: %v", err)
burst = 5
}
return rate, burst return rate, burst
} }
func GetTimeout() int { func GetRoutes() map[string]Proxy {
t := packable.NewString() s := conf.Get("proxy2").GetString()
conf.Get(nsConf, flagTimeout, t) var dict map[string]string
if err := yaml.Unmarshal([]byte(s), &dict); err == nil && len(s) > 0 {
timeout, err := strconv.Atoi(t.String()) pattern := regexp.MustCompile(`(([^:]*):)?(([^:]*):)?([a-z0-9]*:.*)`)
if err != nil || timeout == 5 { result := map[string]Proxy{}
return 5 for k, v := range dict {
submatches := pattern.FindAllStringSubmatch(v, -1)
log.Printf("%+v", submatches)
result[k] = Proxy{
Auth: submatches[0][2],
From: submatches[0][4],
To: submatches[0][5],
}
}
return result
} }
return getRoutesCSV()
}
func getRoutesCSV() map[string]Proxy {
list := conf.Get("proxy2").GetString()
definitions := strings.Split(list, ",,")
routes := make(map[string]Proxy)
for _, definition := range definitions {
k, v := parseOneProxyCSV(definition)
routes[k] = v
}
return routes
}
func GetSSL() (string, string, bool) {
crt := conf.Get("crt").GetString()
key := conf.Get("key").GetString()
return crt, key, crt != "" && key != ""
}
func GetTCP() (string, bool) {
tcp := conf.Get("tcp").GetString()
return tcp, tcp != ""
}
func GetTimeout() time.Duration {
timeout := conf.Get("timeout").GetDuration()
return timeout return timeout
} }
func GetRewrites(hostMatch string) map[string]string { func GetCORS(key string) bool {
v := packable.NewString() cors := conf.GetString("cors")
conf.Get(nsConf, flagRewrites, v) var m map[string]bool
m := make(map[string]string) if err := json.Unmarshal([]byte(cors), &m); err != nil {
for _, v := range strings.Split(v.String(), ",") { return false
vs := strings.Split(v, ":")
if len(v) < 3 {
continue
}
host := vs[0]
if host != hostMatch {
continue
}
from := vs[1]
to := strings.Join(vs[2:], ":")
m[from] = to
} }
return m _, ok := m[key]
return ok
} }
func GetProxyMode() string { func GetNoPath(key string) bool {
v := packable.NewString() nopath := conf.GetString("nopath")
conf.Get(nsConf, flagMode, v) var m map[string]bool
s := v.String() if err := json.Unmarshal([]byte(nopath), &m); err != nil {
if s == "" { return false
return "domain"
} }
return s _, ok := m[key]
return ok
}
func GetCompression() bool {
return conf.GetBool("compression")
} }

180
config/new.go Normal file → Executable file
View File

@ -1,161 +1,61 @@
package config package config
import ( import (
"flag" "fmt"
"io/ioutil"
"local/rproxy3/storage"
"local/rproxy3/storage/packable"
"log" "log"
"os" "os"
"strings" "strings"
"time"
yaml "gopkg.in/yaml.v2" "gitea.bel.blue/local/args"
"gitea.bel.blue/local/logb"
) )
const nsConf = "configuration" var conf *args.ArgSet
const flagPort = "p"
const flagMode = "mode"
const flagRoutes = "r"
const flagConf = "c"
const flagCert = "crt"
const flagKey = "key"
const flagUser = "user"
const flagPass = "pass"
const flagRate = "rate"
const flagBurst = "burst"
const flagTimeout = "timeout"
const flagRewrites = "rw"
var conf = storage.NewMap() func init() {
if err := Refresh(); err != nil {
type toBind struct { panic(err)
flag string }
value *string
} }
type fileConf struct { func Refresh() error {
Port string `yaml:"p"`
Mode string `yaml:"mode"`
Routes []string `yaml:"r"`
CertPath string `yaml:"crt"`
KeyPath string `yaml:"key"`
Username string `yaml:"user"`
Password string `yaml:"pass"`
Rate string `yaml:"rate"`
Burst string `yaml:"burst"`
Timeout string `yaml:"timeout"`
Rewrites []string `yaml:"rw"`
}
func Init() error {
log.SetFlags(log.Ldate | log.Ltime | log.Llongfile) log.SetFlags(log.Ldate | log.Ltime | log.Llongfile)
log.SetFlags(log.Ltime | log.Lshortfile) log.SetFlags(log.Ltime | log.Lshortfile)
if err := fromFile(); err != nil {
return err as, err := parseArgs()
} if err != nil && !strings.Contains(fmt.Sprint(os.Args), "-test") {
if err := fromFlags(); err != nil {
return err return err
} }
conf = as
logb.Set(logb.LevelFromString(as.GetString("level")))
return nil return nil
} }
func fromFile() error { func parseArgs() (*args.ArgSet, error) {
flag.CommandLine = flag.NewFlagSet(os.Args[0], flag.ContinueOnError) configFiles := []string{}
defer func() { if v, ok := os.LookupEnv("CONFIG"); ok {
flag.CommandLine = flag.NewFlagSet(os.Args[0], flag.ExitOnError) configFiles = strings.Split(v, ",")
}()
flag.String(flagConf, "/dev/null", "yaml config file path")
flag.Parse()
confFlag := flag.Lookup(flagConf)
if confFlag == nil || confFlag.Value.String() == "" {
return nil
} }
confBytes, err := ioutil.ReadFile(confFlag.Value.String()) as := args.NewArgSet(configFiles...)
if err != nil {
return err as.Append(args.STRING, "user", "username for basic auth", "")
} as.Append(args.STRING, "pass", "password for basic auth", "")
var c fileConf as.Append(args.INT, "p", "port for service", 51555)
if err := yaml.Unmarshal(confBytes, &c); err != nil { as.Append(args.INT, "ap", "alt port for always http service", 51556)
return err as.Append(args.INT, "r", "rate per second for requests", 100)
} as.Append(args.INT, "b", "burst requests", 100)
if err := conf.Set(nsConf, flagPort, packable.NewString(c.Port)); err != nil { as.Append(args.BOOL, "compress", "enable compression", true)
return err as.Append(args.STRING, "crt", "path to crt for ssl", "")
} as.Append(args.STRING, "key", "path to key for ssl", "")
if err := conf.Set(nsConf, flagMode, packable.NewString(c.Mode)); err != nil { as.Append(args.STRING, "trim", "path prefix to trim, like '/abc' to change '/abc/def' to '/def'", "")
return err as.Append(args.STRING, "tcp", "address for tcp only tunnel", "")
} as.Append(args.DURATION, "timeout", "timeout for tunnel", time.Minute)
if err := conf.Set(nsConf, flagRoutes, packable.NewString(strings.Join(c.Routes, ","))); err != nil { as.Append(args.STRING, "proxy2", "double-comma separated 'from,scheme://to.tld:port,,' OR a yaml dictionary of 'from: (password:)scheme://to.tld:port'", "")
return err as.Append(args.STRING, "cors", "json dict key:true for keys to set CORS permissive headers, like {\"from\":true}", "{}")
} as.Append(args.STRING, "nopath", "json dict key:true for keys to remove all path info from forwarded request, like -cors", "{}")
if err := conf.Set(nsConf, flagCert, packable.NewString(c.CertPath)); err != nil { as.Append(args.STRING, "level", "log level", "info")
return err
} err := as.Parse()
if err := conf.Set(nsConf, flagKey, packable.NewString(c.KeyPath)); err != nil { return as, err
return err
}
if err := conf.Set(nsConf, flagUser, packable.NewString(c.Username)); err != nil {
return err
}
if err := conf.Set(nsConf, flagPass, packable.NewString(c.Password)); err != nil {
return err
}
if err := conf.Set(nsConf, flagRate, packable.NewString(c.Rate)); err != nil {
return err
}
if err := conf.Set(nsConf, flagBurst, packable.NewString(c.Burst)); err != nil {
return err
}
if err := conf.Set(nsConf, flagTimeout, packable.NewString(c.Timeout)); err != nil {
return err
}
if err := conf.Set(nsConf, flagRewrites, packable.NewString(strings.Join(c.Rewrites, ","))); err != nil {
return err
}
return nil
}
func fromFlags() error {
binds := make([]toBind, 0)
binds = append(binds, addFlag(flagPort, "51555", "port to bind to"))
binds = append(binds, addFlag(flagMode, "domain", "[domain] or [path] to match"))
binds = append(binds, addFlag(flagConf, "", "configuration file path"))
binds = append(binds, addFlag(flagRoutes, "", "comma-separated routes to map, each as from:scheme://to.tld:port"))
binds = append(binds, addFlag(flagCert, "", "path to .crt"))
binds = append(binds, addFlag(flagKey, "", "path to .key"))
binds = append(binds, addFlag(flagUser, "", "basic auth username"))
binds = append(binds, addFlag(flagPass, "", "basic auth password"))
binds = append(binds, addFlag(flagRate, "100", "rate limit per second"))
binds = append(binds, addFlag(flagBurst, "100", "rate limit burst"))
binds = append(binds, addFlag(flagTimeout, "30", "seconds to wait for limiter"))
binds = append(binds, addFlag(flagRewrites, "", "comma-separated from:replace:replacement to rewrite in response bodies"))
flag.Parse()
for _, bind := range binds {
confFlag := flag.Lookup(bind.flag)
if confFlag == nil || confFlag.Value.String() == "" {
continue
}
if err := conf.Set(nsConf, bind.flag, packable.NewString(*bind.value)); err != nil {
return err
}
}
return nil
}
func addFlag(key, def, help string) toBind {
def = getFlagOrDefault(key, def)
v := flag.String(key, def, help)
return toBind{
flag: key,
value: v,
}
}
func getFlagOrDefault(key, def string) string {
v := packable.NewString()
if err := conf.Get(nsConf, key, v); err != nil {
return def
}
return v.String()
} }

View File

@ -1,46 +0,0 @@
package config
import (
"flag"
"os"
"testing"
)
func TestInit(t *testing.T) {
was := os.Args[:]
os.Args = []string{"program"}
flag.CommandLine = flag.NewFlagSet(os.Args[0], flag.ExitOnError)
defer func() {
os.Args = was[:]
}()
if err := Init(); err != nil {
t.Errorf("failed to init: %v", err)
}
}
func TestFromFile(t *testing.T) {
was := os.Args[:]
os.Args = []string{"program"}
flag.CommandLine = flag.NewFlagSet(os.Args[0], flag.ExitOnError)
defer func() {
os.Args = was[:]
}()
if err := fromFile(); err != nil {
t.Errorf("failed from file: %v", err)
}
}
func TestFromFlags(t *testing.T) {
was := os.Args[:]
os.Args = []string{"program"}
flag.CommandLine = flag.NewFlagSet(os.Args[0], flag.ExitOnError)
defer func() {
os.Args = was[:]
}()
if err := fromFlags(); err != nil {
t.Errorf("failed from flags: %v", err)
}
}

13
example_config.yaml Executable file
View File

@ -0,0 +1,13 @@
user: ""
pass: ""
port: 51555
r: 100
b: 100
crt: ""
key: ""
tcp: ""
timeout: 1m
proxy2: |
a: http://localhost:41912
b: password:http://localhost:41912
oauth: http://localhost:23456

17
go.mod Normal file
View File

@ -0,0 +1,17 @@
module gitea.bel.blue/local/rproxy3
go 1.18
require (
gitea.bel.blue/local/args v0.0.0-20251121001304-83c57f856714
gitea.bel.blue/local/logb v0.0.0-20251121001353-d45d53fbaae9
github.com/google/uuid v1.3.0
golang.org/x/time v0.1.0
)
require gopkg.in/yaml.v2 v2.4.0
require (
github.com/kr/pretty v0.1.0 // indirect
gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127 // indirect
)

18
go.sum Normal file
View File

@ -0,0 +1,18 @@
gitea.bel.blue/local/args v0.0.0-20251121001304-83c57f856714 h1:JHV86INH1QmPJoyIhdrDLJq7OKta+fJAwbK0pnxI4Hc=
gitea.bel.blue/local/args v0.0.0-20251121001304-83c57f856714/go.mod h1:GCzui3GPhOgKgGYNqtW55YkI3vIWCQEHPydGjFhaXV0=
gitea.bel.blue/local/logb v0.0.0-20251121001353-d45d53fbaae9 h1:lBkQPYgWZnPxt6CvsSwVh9EZtuvi2lIbGOHPqe/gn1Y=
gitea.bel.blue/local/logb v0.0.0-20251121001353-d45d53fbaae9/go.mod h1:+8sJb8UksdadKy43czL7/3TcfBwCkuYT6hFY+RaxP48=
github.com/google/uuid v1.3.0 h1:t6JiXgmwXMjEs8VusXIJk2BXHsn+wx8BZdTaoZ5fu7I=
github.com/google/uuid v1.3.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
github.com/kr/pretty v0.1.0 h1:L/CwN0zerZDmRFUapSPitk6f+Q3+0za1rQkzVuMiMFI=
github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo=
github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ=
github.com/kr/text v0.1.0 h1:45sCR5RtlFHMR4UwH9sdQ5TC8v0qDQCHnXt+kaKSTVE=
github.com/kr/text v0.1.0/go.mod h1:4Jbv+DJW3UT/LiOwJeYQe1efqtUx/iVham/4vfdArNI=
golang.org/x/time v0.1.0 h1:xYY+Bajn2a7VBmTM5GikTmnK8ZuX8YgnQCqZpbBNtmA=
golang.org/x/time v0.1.0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127 h1:qIbj1fsPNlZgppZ+VLlY7N33q108Sa+fhmuc+sWQYwY=
gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
gopkg.in/yaml.v2 v2.4.0 h1:D8xgwECY7CYvx+Y2n4sBz93Jn9JRvxdiyyo8CTfuKaY=
gopkg.in/yaml.v2 v2.4.0/go.mod h1:RDklbk79AGWmwhnvt/jBztapEOGDOx6ZbXqjP6csGnQ=

6
main.go Normal file → Executable file
View File

@ -1,12 +1,12 @@
package main package main
import ( import (
"local/rproxy3/config" "gitea.bel.blue/local/rproxy3/config"
"local/rproxy3/server" "gitea.bel.blue/local/rproxy3/server"
) )
func main() { func main() {
if err := config.Init(); err != nil { if err := config.Refresh(); err != nil {
panic(err) panic(err)
} }

14
main_test.go Normal file → Executable file
View File

@ -34,8 +34,8 @@ func TestHTTPSMain(t *testing.T) {
"username", "username",
"-pass", "-pass",
"password", "password",
"-r", "-proxy2",
"hello:" + addr, "hello," + addr,
"-crt", "-crt",
"./testdata/rproxy3server.crt", "./testdata/rproxy3server.crt",
"-key", "-key",
@ -51,7 +51,7 @@ func TestHTTPSMain(t *testing.T) {
TLSClientConfig: &tls.Config{InsecureSkipVerify: true}, TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
}, },
} }
r, _ := http.NewRequest("GET", "https://hello.localhost"+port, nil) r, _ := http.NewRequest("GET", "https://hello.localhost:"+port, nil)
if resp, err := client.Do(r); err != nil { if resp, err := client.Do(r); err != nil {
t.Fatalf("client failed: %v", err) t.Fatalf("client failed: %v", err)
@ -89,8 +89,8 @@ func TestHTTPMain(t *testing.T) {
"username", "username",
"-pass", "-pass",
"password", "password",
"-r", "-proxy2",
"hello:" + addr, "hello," + addr,
} }
main() main()
}() }()
@ -98,7 +98,7 @@ func TestHTTPMain(t *testing.T) {
time.Sleep(time.Millisecond * 100) time.Sleep(time.Millisecond * 100)
client := &http.Client{} client := &http.Client{}
r, _ := http.NewRequest("GET", "http://hello.localhost"+port, nil) r, _ := http.NewRequest("GET", "http://hello.localhost:"+port, nil)
if resp, err := client.Do(r); err != nil { if resp, err := client.Do(r); err != nil {
t.Fatalf("client failed: %v", err) t.Fatalf("client failed: %v", err)
@ -127,5 +127,5 @@ func echoServer() (string, func()) {
func getPort() string { func getPort() string {
s := httptest.NewServer(nil) s := httptest.NewServer(nil)
s.Close() s.Close()
return s.URL[strings.LastIndex(s.URL, ":"):] return s.URL[strings.LastIndex(s.URL, ":")+1:]
} }

9
server/new.go Normal file → Executable file
View File

@ -1,18 +1,21 @@
package server package server
import ( import (
"local/rproxy3/config" "gitea.bel.blue/local/rproxy3/config"
"local/rproxy3/storage" "gitea.bel.blue/local/rproxy3/storage"
"golang.org/x/time/rate" "golang.org/x/time/rate"
) )
func New() *Server { func New() *Server {
port := config.GetPort() port := config.GetPort()
altport := config.GetAltPort()
r, b := config.GetRate() r, b := config.GetRate()
return &Server{ server := &Server{
db: storage.NewMap(), db: storage.NewMap(),
addr: port, addr: port,
altaddr: altport,
limiter: rate.NewLimiter(rate.Limit(r), b), limiter: rate.NewLimiter(rate.Limit(r), b),
} }
return server
} }

0
server/new_test.go Normal file → Executable file
View File

48
server/proxy.go Normal file → Executable file
View File

@ -2,14 +2,16 @@ package server
import ( import (
"bytes" "bytes"
"crypto/tls"
"io" "io"
"local/rproxy3/config"
"local/rproxy3/storage/packable"
"log" "log"
"net/http" "net/http"
"net/http/httputil" "net/http/httputil"
"net/url" "net/url"
"strings" "strings"
"gitea.bel.blue/local/rproxy3/config"
"gitea.bel.blue/local/rproxy3/storage/packable"
) )
type redirPurge struct { type redirPurge struct {
@ -24,23 +26,21 @@ type rewrite struct {
} }
func (s *Server) Proxy(w http.ResponseWriter, r *http.Request) { func (s *Server) Proxy(w http.ResponseWriter, r *http.Request) {
newURL, err := s.lookup(mapKey(r, config.GetProxyMode())) newURL, err := s.lookup(mapKey(r.Host))
r.URL.Path = strings.TrimPrefix(r.URL.Path, config.GetTrim())
var transport http.RoundTripper var transport http.RoundTripper
http.DefaultTransport.(*http.Transport).TLSClientConfig = &tls.Config{InsecureSkipVerify: true}
transport = &redirPurge{ transport = &redirPurge{
proxyHost: r.Host, proxyHost: r.Host,
targetHost: newURL.Host, targetHost: newURL.Host,
baseTransport: http.DefaultTransport, baseTransport: http.DefaultTransport,
} }
transport = &rewrite{
rewrites: config.GetRewrites(mapKey(r, config.GetProxyMode())),
baseTransport: transport,
}
if err != nil { if err != nil {
http.NotFound(w, r) http.NotFound(w, r)
log.Printf("unknown host lookup %q", r.Host) log.Printf("unknown host lookup %q", r.Host)
return return
} }
r.Host = newURL.Host //r.Host = newURL.Host
proxy := httputil.NewSingleHostReverseProxy(newURL) proxy := httputil.NewSingleHostReverseProxy(newURL)
proxy.Transport = transport proxy.Transport = transport
proxy.ServeHTTP(w, r) proxy.ServeHTTP(w, r)
@ -52,20 +52,22 @@ func (s *Server) lookup(host string) (*url.URL, error) {
return v.URL(), err return v.URL(), err
} }
func mapKey(r *http.Request, proxyMode string) string { func (s *Server) lookupAuth(host string) (string, error) {
switch proxyMode { v := packable.NewString()
case "domain": err := s.db.Get(nsRouting, host+"//auth", v)
host := strings.Split(r.Host, ".")[0] return v.String(), err
host = strings.Split(host, ":")[0] }
return host
case "path": func (s *Server) lookupFrom(host string) (string, error) {
paths := strings.Split(r.URL.Path, "/") v := packable.NewString()
if len(paths) < 2 { err := s.db.Get(nsRouting, host+"//from", v)
return "" return v.String(), err
} }
return paths[1]
} func mapKey(host string) string {
return "" host = strings.Split(host, ".")[0]
host = strings.Split(host, ":")[0]
return host
} }
func (rp *redirPurge) RoundTrip(r *http.Request) (*http.Response, error) { func (rp *redirPurge) RoundTrip(r *http.Request) (*http.Response, error) {
@ -76,6 +78,8 @@ func (rp *redirPurge) RoundTrip(r *http.Request) (*http.Response, error) {
if loc := resp.Header.Get("Location"); loc != "" { if loc := resp.Header.Get("Location"); loc != "" {
resp.Header.Set("Location", strings.Replace(loc, rp.targetHost, rp.proxyHost, 1)) resp.Header.Set("Location", strings.Replace(loc, rp.targetHost, rp.proxyHost, 1))
} }
// google floc https://paramdeo.com/blog/opting-your-website-out-of-googles-floc-network
resp.Header.Set("Permissions-Policy", "interest-cohort=()")
return resp, err return resp, err
} }

33
server/proxy_test.go Normal file → Executable file
View File

@ -3,7 +3,6 @@ package server
import ( import (
"io/ioutil" "io/ioutil"
"net/http" "net/http"
"net/url"
"strings" "strings"
"testing" "testing"
) )
@ -41,35 +40,3 @@ func TestRewrite(t *testing.T) {
t.Errorf("failed to replace: got %q, want \"b\"", b) t.Errorf("failed to replace: got %q, want \"b\"", b)
} }
} }
func TestMapKey(t *testing.T) {
r := &http.Request{
Host: "a.b.c:123",
URL: &url.URL{
Path: "/c/d/e",
},
}
if v := mapKey(r, "domain"); v != "a" {
t.Errorf("failed to get domain: got %v", v)
}
if v := mapKey(r, "path"); v != "c" {
t.Errorf("failed to get domain: got %v", v)
}
r.Host = "a:123"
if v := mapKey(r, "domain"); v != "a" {
t.Errorf("failed to get domain: got %v", v)
}
r.URL.Path = ""
if v := mapKey(r, "path"); v != "" {
t.Errorf("failed to get domain: got %v", v)
}
r.URL.Path = "/"
if v := mapKey(r, "path"); v != "" {
t.Errorf("failed to get domain: got %v", v)
}
}

2
server/routes.go Normal file → Executable file
View File

@ -1,7 +1,7 @@
package server package server
import ( import (
"local/rproxy3/config" "gitea.bel.blue/local/rproxy3/config"
) )
func (s *Server) Routes() error { func (s *Server) Routes() error {

0
server/routes_test.go Normal file → Executable file
View File

314
server/server.go Normal file → Executable file
View File

@ -4,16 +4,24 @@ import (
"context" "context"
"crypto/tls" "crypto/tls"
"encoding/base64" "encoding/base64"
"encoding/json"
"errors" "errors"
"local/rproxy3/config" "fmt"
"local/rproxy3/storage" "io"
"local/rproxy3/storage/packable"
"log" "log"
"net"
"net/http" "net/http"
"net/url" "net/url"
"regexp"
"strconv"
"strings" "strings"
"time" "time"
"gitea.bel.blue/local/rproxy3/config"
"gitea.bel.blue/local/rproxy3/storage"
"gitea.bel.blue/local/rproxy3/storage/packable"
"github.com/google/uuid"
"golang.org/x/time/rate" "golang.org/x/time/rate"
) )
@ -22,8 +30,10 @@ const nsRouting = "routing"
type listenerScheme int type listenerScheme int
const ( const (
schemeHTTP listenerScheme = iota schemeHTTP listenerScheme = iota
schemeHTTPS listenerScheme = iota schemeHTTPS
schemeTCP
schemeTCPTLS
) )
func (ls listenerScheme) String() string { func (ls listenerScheme) String() string {
@ -32,6 +42,10 @@ func (ls listenerScheme) String() string {
return "http" return "http"
case schemeHTTPS: case schemeHTTPS:
return "https" return "https"
case schemeTCP:
return "tcp"
case schemeTCPTLS:
return "tcptls"
} }
return "" return ""
} }
@ -39,32 +53,36 @@ func (ls listenerScheme) String() string {
type Server struct { type Server struct {
db storage.DB db storage.DB
addr string addr string
altaddr string
username string username string
password string password string
limiter *rate.Limiter limiter *rate.Limiter
} }
func (s *Server) Route(src, dst string) error { func (s *Server) Route(src string, dst config.Proxy) error {
log.Printf("Adding route %q -> %q...\n", src, dst) src = strings.TrimPrefix(src, "+")
u, err := url.Parse(dst) log.Printf("Adding route %q -> %v...\n", src, dst)
u, err := url.Parse(dst.To)
if err != nil { if err != nil {
return err return err
} }
if err := s.db.Set(nsRouting, src+"//from", packable.NewString(dst.From)); err != nil {
return err
}
if err := s.db.Set(nsRouting, src+"//auth", packable.NewString(dst.Auth)); err != nil {
return err
}
return s.db.Set(nsRouting, src, packable.NewURL(u)) return s.db.Set(nsRouting, src, packable.NewURL(u))
} }
func (s *Server) Run() error { func (s *Server) Run() error {
scheme := schemeHTTP go s.alt()
if _, _, ok := config.GetSSL(); ok { scheme := getScheme()
scheme = schemeHTTPS
}
log.Printf("Listening for %v on %v...\n", scheme, s.addr) log.Printf("Listening for %v on %v...\n", scheme, s.addr)
switch scheme { switch scheme {
case schemeHTTP: case schemeHTTP:
log.Printf("Serve http")
return http.ListenAndServe(s.addr, s) return http.ListenAndServe(s.addr, s)
case schemeHTTPS: case schemeHTTPS:
log.Printf("Serve https")
c, k, _ := config.GetSSL() c, k, _ := config.GetSSL()
httpsServer := &http.Server{ httpsServer := &http.Server{
Addr: s.addr, Addr: s.addr,
@ -83,42 +101,244 @@ func (s *Server) Run() error {
TLSNextProto: make(map[string]func(*http.Server, *tls.Conn, http.Handler), 0), TLSNextProto: make(map[string]func(*http.Server, *tls.Conn, http.Handler), 0),
} }
return httpsServer.ListenAndServeTLS(c, k) return httpsServer.ListenAndServeTLS(c, k)
case schemeTCP:
addr, _ := config.GetTCP()
return s.ServeTCP(addr)
case schemeTCPTLS:
addr, _ := config.GetTCP()
cert, key, _ := config.GetSSL()
return s.ServeTCPTLS(addr, cert, key)
} }
return errors.New("did not load server") return errors.New("did not load server")
} }
func (s *Server) doAuth(foo http.HandlerFunc) http.HandlerFunc { func (s *Server) ServeTCPTLS(addr, c, k string) error {
return func(w http.ResponseWriter, r *http.Request) { certificate, err := tls.LoadX509KeyPair(c, k)
rusr, rpwd, ok := config.GetAuth() if err != nil {
if ok { return err
//usr, pwd := getProxyAuth(r) }
usr, pwd, ok := r.BasicAuth() certificates := []tls.Certificate{certificate}
if !ok || rusr != usr || rpwd != pwd { listen, err := net.Listen("tcp", s.addr)
w.WriteHeader(http.StatusUnauthorized) if err != nil {
log.Printf("denying proxy basic auth") return err
}
defer listen.Close()
config := &tls.Config{
Certificates: certificates,
MinVersion: tls.VersionTLS12,
CurvePreferences: []tls.CurveID{tls.CurveP521, tls.CurveP384, tls.CurveP256},
PreferServerCipherSuites: true,
CipherSuites: []uint16{
tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
tls.TLS_RSA_WITH_AES_256_GCM_SHA384,
tls.TLS_RSA_WITH_AES_256_CBC_SHA,
},
}
config.BuildNameToCertificate()
tlsListener := tls.NewListener(listen, config)
return s.serveTCP(addr, tlsListener)
}
func (s *Server) ServeTCP(addr string) error {
listen, err := net.Listen("tcp", s.addr)
if err != nil {
return err
}
defer listen.Close()
return s.serveTCP(addr, listen)
}
func (s *Server) serveTCP(addr string, listen net.Listener) error {
for {
c, err := listen.Accept()
if err != nil {
return err
}
go func(c net.Conn) {
d, err := net.Dial("tcp", addr)
if err != nil {
log.Println(err)
return return
} }
} go pipe(c, d)
foo(w, r) go pipe(d, c)
}(c)
} }
} }
func pipe(a, b net.Conn) {
log.Println("open pipe")
defer log.Println("close pipe")
defer a.Close()
defer b.Close()
io.Copy(a, b)
}
func (s *Server) Pre(foo http.HandlerFunc) http.HandlerFunc { func (s *Server) Pre(foo http.HandlerFunc) http.HandlerFunc {
return func(w http.ResponseWriter, r *http.Request) { return func(w http.ResponseWriter, r *http.Request) {
ctx, can := context.WithTimeout(r.Context(), time.Second*time.Duration(config.GetTimeout())) r, flush := withMeta(w, r)
defer flush()
ctx, can := context.WithTimeout(r.Context(), time.Duration(config.GetTimeout()))
defer can() defer can()
if err := s.limiter.Wait(ctx); err != nil { if err := s.limiter.Wait(ctx); err != nil {
pushMeta(r, "explain", "limiter exceeded")
w.WriteHeader(http.StatusTooManyRequests) w.WriteHeader(http.StatusTooManyRequests)
return return
} }
s.doAuth(foo)(w, r)
if r.URL.Scheme == "https" {
w.Header().Set("X-Forwarded-Proto", "https")
}
w, did := doCORS(w, r)
if did {
pushMeta(r, "explain", "did cors")
return
}
if mapKey(r.Host) == "_" {
s.List(w)
return
}
if auth, err := s.lookupAuth(mapKey(r.Host)); err != nil {
log.Printf("failed to lookup auth for %s (%s): %v", r.Host, mapKey(r.Host), err)
w.Header().Set("WWW-Authenticate", "Basic")
http.Error(w, err.Error(), http.StatusUnauthorized)
} else if _, p, _ := r.BasicAuth(); auth != "" && auth != p {
log.Printf("failed to auth: expected %q but got %q", auth, p)
w.Header().Set("WWW-Authenticate", "Basic")
http.Error(w, "unexpected basic auth", http.StatusUnauthorized)
} else if from, err := s.lookupFrom(mapKey(r.Host)); err != nil {
log.Printf("failed to lookup from for %s (%s): %v", r.Host, mapKey(r.Host), err)
http.Error(w, err.Error(), http.StatusBadGateway)
} else if err := assertFrom(from, r.RemoteAddr); err != nil {
log.Printf("failed to from: expected %q but got %q: %v", from, r.RemoteAddr, err)
http.Error(w, "unexpected from", http.StatusUnauthorized)
} else {
foo(w, r)
}
} }
} }
func assertFrom(from, remoteAddr string) error {
if from == "" {
return nil
}
pattern := regexp.MustCompile(`[0-9](:[0-9]+)$`).FindStringSubmatchIndex(remoteAddr)
if len(pattern) == 4 {
remoteAddr = remoteAddr[:pattern[2]]
}
remoteIP := net.ParseIP(remoteAddr)
if remoteIP == nil {
return fmt.Errorf("cannot parse remote %q", remoteAddr)
}
_, net, err := net.ParseCIDR(from)
if err != nil {
panic(err)
}
if net.Contains(remoteIP) {
return nil
}
return fmt.Errorf("expected like %q but got like %q", from, remoteAddr)
}
func withMeta(w http.ResponseWriter, r *http.Request) (*http.Request, func()) {
meta := map[string]string{
"ts": strconv.FormatInt(time.Now().Unix(), 10),
"method": r.Method,
"url": r.URL.String(),
"id": uuid.New().String(),
}
w.Header().Set("meta-id", meta["id"])
ctx := r.Context()
ctx = context.WithValue(ctx, "meta", meta)
r = r.WithContext(ctx)
return r, func() {
b, err := json.Marshal(meta)
if err != nil {
panic(err)
}
fmt.Printf("[access] %s\n", b)
}
}
func pushMeta(r *http.Request, k, v string) {
got := r.Context().Value("meta")
if got == nil {
return
}
meta, ok := got.(map[string]string)
if !ok || meta == nil {
return
}
meta[k] = v
}
func (s *Server) ServeHTTP(w http.ResponseWriter, r *http.Request) { func (s *Server) ServeHTTP(w http.ResponseWriter, r *http.Request) {
s.Pre(s.Proxy)(w, r) s.Pre(s.Proxy)(w, r)
} }
func (s *Server) List(w http.ResponseWriter) {
keys := s.db.Keys(nsRouting)
hostURL := map[string]string{}
hostFrom := map[string]string{}
for _, key := range keys {
u, _ := s.lookup(key)
if u != nil && strings.TrimSuffix(key, "//auth") == key {
hostURL[key] = u.String()
}
if u != nil && strings.TrimSuffix(key, "//from") == key {
hostFrom[key] = u.String()
}
}
json.NewEncoder(w).Encode(map[string]any{
"hostsToURLs": hostURL,
"hostsToFrom": hostFrom,
})
}
type corsResponseWriter struct {
r *http.Request
http.ResponseWriter
}
func (cb corsResponseWriter) WriteHeader(code int) {
cb.Header().Set("Access-Control-Allow-Origin", "*")
cb.Header().Set("Access-Control-Allow-Headers", "X-Auth-Token, content-type, Content-Type")
cb.ResponseWriter.WriteHeader(code)
pushMeta(cb.r, "cors", "wrote headers")
}
func doCORS(w http.ResponseWriter, r *http.Request) (http.ResponseWriter, bool) {
key := mapKey(r.Host)
if !config.GetCORS(key) {
return w, false
}
pushMeta(r, "do-cors", "enabled for key")
return _doCORS(w, r)
}
func _doCORS(w http.ResponseWriter, r *http.Request) (http.ResponseWriter, bool) {
w2 := corsResponseWriter{r: r, ResponseWriter: w}
if r.Method != http.MethodOptions {
pushMeta(r, "-do-cors", "not options")
return w2, false
}
pushMeta(r, "-do-cors", "options")
w2.Header().Set("Content-Length", "0")
w2.Header().Set("Content-Type", "text/plain")
w2.Header().Set("Access-Control-Allow-Methods", "GET, POST, PUT, OPTIONS, TRACE, PATCH, HEAD, DELETE")
w2.WriteHeader(http.StatusOK)
return w2, true
}
func getProxyAuth(r *http.Request) (string, string) { func getProxyAuth(r *http.Request) (string, string) {
proxyAuthHeader := r.Header.Get("Proxy-Authorization") proxyAuthHeader := r.Header.Get("Proxy-Authorization")
proxyAuthB64 := strings.TrimPrefix(proxyAuthHeader, "Basic ") proxyAuthB64 := strings.TrimPrefix(proxyAuthHeader, "Basic ")
@ -130,3 +350,43 @@ func getProxyAuth(r *http.Request) (string, string) {
proxyAuthSplit := strings.Split(proxyAuth, ":") proxyAuthSplit := strings.Split(proxyAuth, ":")
return proxyAuthSplit[0], proxyAuthSplit[1] return proxyAuthSplit[0], proxyAuthSplit[1]
} }
func (s *Server) alt() {
switch getScheme() {
case schemeHTTP:
case schemeHTTPS:
default:
return
}
foo := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
r.URL.Scheme = getScheme().String()
if hostname := r.URL.Hostname(); hostname != "" {
r.URL.Host = r.URL.Hostname() + s.addr
} else if hostname := r.URL.Host; hostname != "" {
r.URL.Host = r.URL.Host + s.addr
} else {
u := url.URL{Host: r.Host}
r.URL.Host = u.Hostname() + s.addr
}
http.Redirect(w, r, r.URL.String(), http.StatusSeeOther)
})
log.Println("redirecting from", s.altaddr)
if err := http.ListenAndServe(s.altaddr, foo); err != nil {
panic(err)
}
}
func getScheme() listenerScheme {
scheme := schemeHTTP
_, _, ssl := config.GetSSL()
if ssl {
scheme = schemeHTTPS
}
if _, ok := config.GetTCP(); ok {
scheme = schemeTCP
if ssl {
scheme = schemeTCPTLS
}
}
return scheme
}

81
server/server_test.go Normal file → Executable file
View File

@ -3,19 +3,25 @@ package server
import ( import (
"context" "context"
"fmt" "fmt"
"local/rproxy3/storage"
"net/http" "net/http"
"net/http/httptest" "net/http/httptest"
"strings" "strings"
"testing" "testing"
"gitea.bel.blue/local/rproxy3/config"
"gitea.bel.blue/local/rproxy3/storage"
"golang.org/x/time/rate" "golang.org/x/time/rate"
) )
func TestServerStart(t *testing.T) { func TestServerStart(t *testing.T) {
return // depends on etc hosts
server := mockServer() server := mockServer()
if err := server.Route("world", "http://hello.localhost"+server.addr); err != nil { p := config.Proxy{
To: "http://hello.localhost" + server.addr,
}
if err := server.Route("world", p); err != nil {
t.Fatalf("cannot add route: %v", err) t.Fatalf("cannot add route: %v", err)
} }
@ -48,7 +54,10 @@ func mockServer() *Server {
func TestServerRoute(t *testing.T) { func TestServerRoute(t *testing.T) {
server := mockServer() server := mockServer()
if err := server.Route("world", "http://hello.localhost"+server.addr); err != nil { p := config.Proxy{
To: "http://hello.localhost" + server.addr,
}
if err := server.Route("world", p); err != nil {
t.Fatalf("cannot add route: %v", err) t.Fatalf("cannot add route: %v", err)
} }
w := httptest.NewRecorder() w := httptest.NewRecorder()
@ -59,3 +68,69 @@ func TestServerRoute(t *testing.T) {
t.Fatalf("cannot proxy from 'world' to 'hello', status %v", w.Code) t.Fatalf("cannot proxy from 'world' to 'hello', status %v", w.Code)
} }
} }
func TestCORS(t *testing.T) {
t.Run(http.MethodOptions, func(t *testing.T) {
w := httptest.NewRecorder()
r := httptest.NewRequest(http.MethodOptions, "/", nil)
w2, did := _doCORS(w, r)
w2.WriteHeader(300)
if !did {
t.Error("didnt do on options")
}
if w.Header().Get("Access-Control-Allow-Origin") != "*" {
t.Error("didnt set origina")
}
if w.Header().Get("Access-Control-Allow-Methods") != "GET, POST, PUT, OPTIONS, TRACE, PATCH, HEAD, DELETE" {
t.Error("didnt set allow methods")
}
})
t.Run(http.MethodGet, func(t *testing.T) {
w := httptest.NewRecorder()
r := httptest.NewRequest(http.MethodGet, "/", nil)
w2, did := _doCORS(w, r)
w2.Header().Set("a", "b")
w2.Header().Set("Access-Control-Allow-Origin", "NO")
w2.WriteHeader(300)
if did {
t.Error("did cors on options")
}
if w.Header().Get("Access-Control-Allow-Origin") != "*" {
t.Error("didnt set origina")
} else if len(w.Header()["Access-Control-Allow-Origin"]) != 1 {
t.Error(w.Header())
}
if w.Header().Get("Access-Control-Allow-Methods") != "" {
t.Error("did set allow methods")
}
})
}
func TestAssertFrom(t *testing.T) {
cases := map[string]struct {
from string
remote string
err bool
}{
"empty": {},
"ipv6 localhost": {
from: "::1/128",
remote: "::1:12345",
},
"ipv4 localhost": {
from: "127.0.0.1/32",
remote: "127.0.0.1:12345",
},
}
for name, d := range cases {
c := d
t.Run(name, func(t *testing.T) {
err := assertFrom(c.from, c.remote)
got := err != nil
if got != c.err {
t.Errorf("expected err=%v but got %v", c.err, err)
}
})
}
}

4
storage/db.go Normal file → Executable file
View File

@ -2,7 +2,8 @@ package storage
import ( import (
"errors" "errors"
"local/rproxy3/storage/packable"
"gitea.bel.blue/local/rproxy3/storage/packable"
) )
var ErrNotFound = errors.New("not found") var ErrNotFound = errors.New("not found")
@ -10,5 +11,6 @@ var ErrNotFound = errors.New("not found")
type DB interface { type DB interface {
Get(string, string, packable.Packable) error Get(string, string, packable.Packable) error
Set(string, string, packable.Packable) error Set(string, string, packable.Packable) error
Keys(string) []string
Close() error Close() error
} }

3
storage/db_test.go Normal file → Executable file
View File

@ -1,9 +1,10 @@
package storage package storage
import ( import (
"local/rproxy3/storage/packable"
"os" "os"
"testing" "testing"
"gitea.bel.blue/local/rproxy3/storage/packable"
) )
func TestDB(t *testing.T) { func TestDB(t *testing.T) {

12
storage/map.go Normal file → Executable file
View File

@ -2,7 +2,8 @@ package storage
import ( import (
"fmt" "fmt"
"local/rproxy3/storage/packable"
"gitea.bel.blue/local/rproxy3/storage/packable"
) )
type Map map[string]map[string][]byte type Map map[string]map[string][]byte
@ -40,6 +41,15 @@ func (m Map) Close() error {
return nil return nil
} }
func (m Map) Keys(ns string) []string {
m2, _ := m[ns]
result := make([]string, 0, len(m2))
for k := range m2 {
result = append(result, k)
}
return result
}
func (m Map) Get(ns, key string, value packable.Packable) error { func (m Map) Get(ns, key string, value packable.Packable) error {
if _, ok := m[ns]; !ok { if _, ok := m[ns]; !ok {
m[ns] = make(map[string][]byte) m[ns] = make(map[string][]byte)

0
storage/packable/packable.go Normal file → Executable file
View File

0
storage/packable/packable_test.go Normal file → Executable file
View File

0
testdata/Bserver.crt vendored Normal file → Executable file
View File

0
testdata/Bserver.key vendored Normal file → Executable file
View File

0
testdata/Bserver.pkcs12 vendored Normal file → Executable file
View File

36
testdata/index.html vendored Executable file
View File

@ -0,0 +1,36 @@
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<meta http-equiv="X-UA-Compatible" content="ie=edge" />
<title>Go WebSocket Tutorial</title>
</head>
<body>
<h2>Hello World</h2>
<script>
let socket = new WebSocket("ws://a.bel.test:51555/ws");
document.getElementsByTagName("body")[0].innerHTML += "<br>connecting";
socket.onopen = () => {
document.getElementsByTagName("body")[0].innerHTML += "<br>connected";
socket.send("Hi From the Client!")
};
socket.onclose = event => {
document.getElementsByTagName("body")[0].innerHTML += "<br>disconnected";
socket.send("Client Closed!")
};
socket.onerror = error => {
document.getElementsByTagName("body")[0].innerHTML += "<br>error:" + error;
console.log("Socket Error: ", error);
};
socket.onmessage = function(msgevent) {
document.getElementsByTagName("body")[0].innerHTML += "<br>got:" + msgevent.data;
};
</script>
</body>
</html>

0
testdata/rproxy3server.crt vendored Normal file → Executable file
View File

0
testdata/rproxy3server.key vendored Normal file → Executable file
View File

0
testdata/rproxy3server.pkcs12 vendored Normal file → Executable file
View File

76
testdata/ws.go vendored Executable file
View File

@ -0,0 +1,76 @@
package main
import (
"fmt"
"io/ioutil"
"log"
"net/http"
"time"
"github.com/gorilla/websocket"
)
func homePage(w http.ResponseWriter, r *http.Request) {
b, _ := ioutil.ReadFile("./index.html")
fmt.Fprintf(w, "%s", b)
}
func setupRoutes() {
http.HandleFunc("/", homePage)
http.HandleFunc("/ws", wsEndpoint)
}
func main() {
fmt.Println("Hello World")
setupRoutes()
log.Fatal(http.ListenAndServe(":8080", nil))
}
var upgrader = websocket.Upgrader{
ReadBufferSize: 1024,
WriteBufferSize: 1024,
}
func reader(conn *websocket.Conn) {
for {
// read in a message
messageType, p, err := conn.ReadMessage()
if err != nil {
log.Println(err)
return
}
// print out that message for clarity
fmt.Println(string(p))
if err := conn.WriteMessage(messageType, p); err != nil {
log.Println(err)
return
}
}
}
func wsEndpoint(w http.ResponseWriter, r *http.Request) {
upgrader.CheckOrigin = func(r *http.Request) bool { return true }
// upgrade this connection to a WebSocket
// connection
ws, err := upgrader.Upgrade(w, r, nil)
if err != nil {
log.Println(err)
}
log.Println("Client Connected")
// listen indefinitely for new messages coming
// through on our WebSocket connection
go reader(ws)
for {
log.Println("writing...")
err = ws.WriteMessage(1, []byte("Hi Client!"))
log.Println("written")
if err != nil {
log.Println(err)
return
}
time.Sleep(time.Second)
}
}

25
vendor/vendor.json vendored
View File

@ -1,25 +0,0 @@
{
"comment": "",
"ignore": "test",
"package": [
{
"checksumSHA1": "GtamqiJoL7PGHsN454AoffBFMa8=",
"path": "golang.org/x/net/context",
"revision": "65e2d4e15006aab9813ff8769e768bbf4bb667a0",
"revisionTime": "2019-02-01T23:59:58Z"
},
{
"checksumSHA1": "HoCvrd3hEhsFeBOdEw7cbcfyk50=",
"path": "golang.org/x/time/rate",
"revision": "fbb02b2291d28baffd63558aa44b4b56f178d650",
"revisionTime": "2018-04-12T16:56:04Z"
},
{
"checksumSHA1": "QqDq2x8XOU7IoOR98Cx1eiV5QY8=",
"path": "gopkg.in/yaml.v2",
"revision": "51d6538a90f86fe93ac480b35f37b2be17fef232",
"revisionTime": "2018-11-15T11:05:04Z"
}
],
"rootPath": "local/rproxy3"
}