wghttp/main.go

171 lines
4.8 KiB
Go

package main
import (
"bufio"
"context"
_ "embed"
"fmt"
"net"
"net/http"
"os"
"strings"
"github.com/jessevdk/go-flags"
"golang.zx2c4.com/wireguard/device"
"golang.zx2c4.com/wireguard/tun/netstack"
"github.com/zhsj/wghttp/internal/third_party/tailscale/httpproxy"
"github.com/zhsj/wghttp/internal/third_party/tailscale/proxymux"
"github.com/zhsj/wghttp/internal/third_party/tailscale/socks5"
)
//go:embed README.md
var readme string
var logger *device.Logger
type options struct {
PeerEndpoint string `long:"peer-endpoint" env:"PEER_ENDPOINT" required:"true" description:"WireGuard server address"`
PeerKey string `long:"peer-key" env:"PEER_KEY" required:"true" description:"WireGuard server public key in base64 format"`
PrivateKey string `long:"private-key" env:"PRIVATE_KEY" required:"true" description:"WireGuard client private key in base64 format"`
ClientIPs []string `long:"client-ip" env:"CLIENT_IP" env-delim:"," required:"true" description:"WireGuard client IP address"`
Listen string `long:"listen" env:"LISTEN" default:"localhost:8080" description:"HTTP & SOCKS5 server address"`
DNS []string `long:"dns" env:"DNS" env-delim:"," default:"" description:"DNS server IP address, only used in WireGuard"`
MTU int `long:"mtu" env:"MTU" default:"1280" description:"MTU"`
ExitMode string `long:"exit-mode" env:"EXIT_MODE" default:"remote" choice:"remote" choice:"local" description:"Exit mode"`
Verbose bool `short:"v" long:"verbose" description:"Show verbose debug information"`
ClientID string `long:"client-id" env:"CLIENT_ID" hidden:"true"`
}
func main() {
opts := options{}
parser := flags.NewParser(&opts, flags.Default)
parser.Usage = `[OPTIONS]
Description:`
scanner := bufio.NewScanner(strings.NewReader(strings.TrimPrefix(readme, "# wghttp\n")))
for scanner.Scan() {
parser.Usage += " " + scanner.Text() + "\n"
}
parser.Usage = strings.TrimSuffix(parser.Usage, "\n")
if _, err := parser.Parse(); err != nil {
code := 1
if fe, ok := err.(*flags.Error); ok {
if fe.Type == flags.ErrHelp {
code = 0
}
}
os.Exit(code)
}
if opts.Verbose {
logger = device.NewLogger(device.LogLevelVerbose, "")
} else {
logger = device.NewLogger(device.LogLevelError, "")
}
dev, tnet, err := setupNet(opts)
if err != nil {
logger.Errorf("Setup netstack: %v", err)
os.Exit(1)
}
listener, err := netListener(opts, tnet)
if err != nil {
logger.Errorf("Create net listener: %v", err)
os.Exit(1)
}
socksListener, httpListener := proxymux.SplitSOCKSAndHTTP(listener)
dialer := netDialer(opts, tnet)
httpProxy := &http.Server{Handler: statsHandler(httpproxy.Handler(dialer), dev)}
socksProxy := &socks5.Server{Dialer: dialer}
errc := make(chan error, 2)
go func() {
if err := httpProxy.Serve(httpListener); err != nil {
logger.Errorf("Serving http proxy: %v", err)
errc <- err
}
}()
go func() {
if err := socksProxy.Serve(socksListener); err != nil {
logger.Errorf("Serving socks5 proxy: %v", err)
errc <- err
}
}()
<-errc
os.Exit(1)
}
func netListener(opts options, tnet *netstack.Net) (net.Listener, error) {
var tcpListener net.Listener
tcpAddr, err := net.ResolveTCPAddr("tcp", opts.Listen)
if err != nil {
return nil, fmt.Errorf("resolve listen addr: %w", err)
}
switch opts.ExitMode {
case "local":
tcpListener, err = tnet.ListenTCP(tcpAddr)
if err != nil {
return nil, fmt.Errorf("create listener on netstack: %w", err)
}
case "remote":
tcpListener, err = net.ListenTCP("tcp", tcpAddr)
if err != nil {
return nil, fmt.Errorf("create listener on local net: %w", err)
}
}
logger.Verbosef("Listening on %s", tcpListener.Addr())
return tcpListener, nil
}
func netDialer(opts options, tnet *netstack.Net) (dialer func(ctx context.Context, network, address string) (net.Conn, error)) {
switch opts.ExitMode {
case "local":
var d net.Dialer
dialer = d.DialContext
case "remote":
dialer = tnet.DialContext
}
return
}
func setupNet(opts options) (*device.Device, *netstack.Net, error) {
ips := []net.IP{}
for _, s := range opts.ClientIPs {
ip := net.ParseIP(s)
if ip == nil {
return nil, nil, fmt.Errorf("invalid client ip: %s", s)
}
ips = append(ips, ip)
}
dnsServers := []net.IP{}
for _, s := range opts.DNS {
ip := net.ParseIP(s)
if ip == nil {
return nil, nil, fmt.Errorf("invalid dns ip: %s", s)
}
dnsServers = append(dnsServers, ip)
}
tun, tnet, err := netstack.CreateNetTUN(ips, dnsServers, opts.MTU)
if err != nil {
return nil, nil, fmt.Errorf("create netstack tun: %w", err)
}
dev := device.NewDevice(tun, newConnBind(opts.ClientID), logger)
if err := ipcSet(dev, opts); err != nil {
return nil, nil, fmt.Errorf("config device: %w", err)
}
if err := dev.Up(); err != nil {
return nil, nil, fmt.Errorf("bring up device: %w", err)
}
return dev, tnet, nil
}