mirror of
https://github.com/netbirdio/netbird.git
synced 2025-01-07 22:49:35 +01:00
Add exposed address
This commit is contained in:
parent
d3785dc1fa
commit
15a7b7629b
@ -606,9 +606,9 @@ func (conn *Conn) doHandshake() error {
|
|||||||
err error
|
err error
|
||||||
)
|
)
|
||||||
ha.IceUFrag, ha.IcePwd = conn.workerICE.GetLocalUserCredentials()
|
ha.IceUFrag, ha.IcePwd = conn.workerICE.GetLocalUserCredentials()
|
||||||
addr, err := conn.workerRelay.RelayAddress()
|
addr, err := conn.workerRelay.RelayInstanceAddress()
|
||||||
if err == nil {
|
if err == nil {
|
||||||
ha.RelayAddr = addr.String()
|
ha.RelayAddr = addr
|
||||||
}
|
}
|
||||||
conn.log.Tracef("send new offer: %#v", ha)
|
conn.log.Tracef("send new offer: %#v", ha)
|
||||||
return conn.handshaker.SendOffer(ha)
|
return conn.handshaker.SendOffer(ha)
|
||||||
|
@ -46,13 +46,13 @@ func (w *WorkerRelay) OnNewOffer(remoteOfferAnswer *OfferAnswer) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// the relayManager will return with error in case if the connection has lost with relay server
|
// the relayManager will return with error in case if the connection has lost with relay server
|
||||||
currentRelayAddress, err := w.relayManager.RelayAddress()
|
currentRelayAddress, err := w.relayManager.RelayInstanceAddress()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
w.log.Infof("local Relay connection is lost, skipping connection attempt")
|
w.log.Infof("local Relay connection is lost, skipping connection attempt")
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
srv := w.preferredRelayServer(currentRelayAddress.String(), remoteOfferAnswer.RelaySrvAddress)
|
srv := w.preferredRelayServer(currentRelayAddress, remoteOfferAnswer.RelaySrvAddress)
|
||||||
|
|
||||||
relayedConn, err := w.relayManager.OpenConn(srv, w.config.Key, w.conn.OnDisconnected)
|
relayedConn, err := w.relayManager.OpenConn(srv, w.config.Key, w.conn.OnDisconnected)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -73,8 +73,8 @@ func (w *WorkerRelay) OnNewOffer(remoteOfferAnswer *OfferAnswer) {
|
|||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
func (w *WorkerRelay) RelayAddress() (net.Addr, error) {
|
func (w *WorkerRelay) RelayInstanceAddress() (string, error) {
|
||||||
return w.relayManager.RelayAddress()
|
return w.relayManager.RelayInstanceAddress()
|
||||||
}
|
}
|
||||||
|
|
||||||
func (w *WorkerRelay) IsController() bool {
|
func (w *WorkerRelay) IsController() bool {
|
||||||
|
@ -9,7 +9,7 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
// CreateCertManager wraps common logic of generating Let's encrypt certificate.
|
// CreateCertManager wraps common logic of generating Let's encrypt certificate.
|
||||||
func CreateCertManager(datadir string, letsencryptDomain string) (*autocert.Manager, error) {
|
func CreateCertManager(datadir string, letsencryptDomain ...string) (*autocert.Manager, error) {
|
||||||
certDir := filepath.Join(datadir, "letsencrypt")
|
certDir := filepath.Join(datadir, "letsencrypt")
|
||||||
|
|
||||||
if _, err := os.Stat(certDir); os.IsNotExist(err) {
|
if _, err := os.Stat(certDir); os.IsNotExist(err) {
|
||||||
@ -24,7 +24,7 @@ func CreateCertManager(datadir string, letsencryptDomain string) (*autocert.Mana
|
|||||||
certManager := &autocert.Manager{
|
certManager := &autocert.Manager{
|
||||||
Prompt: autocert.AcceptTOS,
|
Prompt: autocert.AcceptTOS,
|
||||||
Cache: autocert.DirCache(certDir),
|
Cache: autocert.DirCache(certDir),
|
||||||
HostPolicy: autocert.HostWhitelist(letsencryptDomain),
|
HostPolicy: autocert.HostWhitelist(letsencryptDomain...),
|
||||||
}
|
}
|
||||||
|
|
||||||
return certManager, nil
|
return certManager, nil
|
||||||
|
4
go.mod
4
go.mod
@ -47,7 +47,6 @@ require (
|
|||||||
github.com/google/martian/v3 v3.0.0
|
github.com/google/martian/v3 v3.0.0
|
||||||
github.com/google/nftables v0.0.0-20220808154552-2eca00135732
|
github.com/google/nftables v0.0.0-20220808154552-2eca00135732
|
||||||
github.com/gopacket/gopacket v1.1.1
|
github.com/gopacket/gopacket v1.1.1
|
||||||
github.com/gorilla/websocket v1.5.1
|
|
||||||
github.com/grpc-ecosystem/go-grpc-middleware/v2 v2.0.2-0.20240212192251-757544f21357
|
github.com/grpc-ecosystem/go-grpc-middleware/v2 v2.0.2-0.20240212192251-757544f21357
|
||||||
github.com/hashicorp/go-multierror v1.1.1
|
github.com/hashicorp/go-multierror v1.1.1
|
||||||
github.com/hashicorp/go-secure-stdlib/base62 v0.1.2
|
github.com/hashicorp/go-secure-stdlib/base62 v0.1.2
|
||||||
@ -64,6 +63,7 @@ require (
|
|||||||
github.com/oschwald/maxminddb-golang v1.12.0
|
github.com/oschwald/maxminddb-golang v1.12.0
|
||||||
github.com/patrickmn/go-cache v2.1.0+incompatible
|
github.com/patrickmn/go-cache v2.1.0+incompatible
|
||||||
github.com/pion/logging v0.2.2
|
github.com/pion/logging v0.2.2
|
||||||
|
github.com/pion/randutil v0.1.0
|
||||||
github.com/pion/stun/v2 v2.0.0
|
github.com/pion/stun/v2 v2.0.0
|
||||||
github.com/pion/transport/v3 v3.0.1
|
github.com/pion/transport/v3 v3.0.1
|
||||||
github.com/pion/turn/v3 v3.0.1
|
github.com/pion/turn/v3 v3.0.1
|
||||||
@ -77,6 +77,7 @@ require (
|
|||||||
github.com/things-go/go-socks5 v0.0.4
|
github.com/things-go/go-socks5 v0.0.4
|
||||||
github.com/yusufpapurcu/wmi v1.2.4
|
github.com/yusufpapurcu/wmi v1.2.4
|
||||||
github.com/zcalusic/sysinfo v1.0.2
|
github.com/zcalusic/sysinfo v1.0.2
|
||||||
|
go.mongodb.org/mongo-driver v1.16.0
|
||||||
go.opentelemetry.io/otel v1.26.0
|
go.opentelemetry.io/otel v1.26.0
|
||||||
go.opentelemetry.io/otel/exporters/prometheus v0.48.0
|
go.opentelemetry.io/otel/exporters/prometheus v0.48.0
|
||||||
go.opentelemetry.io/otel/metric v1.26.0
|
go.opentelemetry.io/otel/metric v1.26.0
|
||||||
@ -173,7 +174,6 @@ require (
|
|||||||
github.com/pegasus-kv/thrift v0.13.0 // indirect
|
github.com/pegasus-kv/thrift v0.13.0 // indirect
|
||||||
github.com/pion/dtls/v2 v2.2.10 // indirect
|
github.com/pion/dtls/v2 v2.2.10 // indirect
|
||||||
github.com/pion/mdns v0.0.12 // indirect
|
github.com/pion/mdns v0.0.12 // indirect
|
||||||
github.com/pion/randutil v0.1.0 // indirect
|
|
||||||
github.com/pion/transport/v2 v2.2.4 // indirect
|
github.com/pion/transport/v2 v2.2.4 // indirect
|
||||||
github.com/pkg/errors v0.9.1 // indirect
|
github.com/pkg/errors v0.9.1 // indirect
|
||||||
github.com/pmezard/go-difflib v1.0.0 // indirect
|
github.com/pmezard/go-difflib v1.0.0 // indirect
|
||||||
|
4
go.sum
4
go.sum
@ -237,8 +237,6 @@ github.com/gopherjs/gopherjs v0.0.0-20220410123724-9e86199038b0 h1:fWY+zXdWhvWnd
|
|||||||
github.com/gopherjs/gopherjs v0.0.0-20220410123724-9e86199038b0/go.mod h1:pRRIvn/QzFLrKfvEz3qUuEhtE/zLCWfreZ6J5gM2i+k=
|
github.com/gopherjs/gopherjs v0.0.0-20220410123724-9e86199038b0/go.mod h1:pRRIvn/QzFLrKfvEz3qUuEhtE/zLCWfreZ6J5gM2i+k=
|
||||||
github.com/gorilla/mux v1.8.0 h1:i40aqfkR1h2SlN9hojwV5ZA91wcXFOvkdNIeFDP5koI=
|
github.com/gorilla/mux v1.8.0 h1:i40aqfkR1h2SlN9hojwV5ZA91wcXFOvkdNIeFDP5koI=
|
||||||
github.com/gorilla/mux v1.8.0/go.mod h1:DVbg23sWSpFRCP0SfiEN6jmj59UnW/n46BH5rLB71So=
|
github.com/gorilla/mux v1.8.0/go.mod h1:DVbg23sWSpFRCP0SfiEN6jmj59UnW/n46BH5rLB71So=
|
||||||
github.com/gorilla/websocket v1.5.1 h1:gmztn0JnHVt9JZquRuzLw3g4wouNVzKL15iLr/zn/QY=
|
|
||||||
github.com/gorilla/websocket v1.5.1/go.mod h1:x3kM2JMyaluk02fnUJpQuwD2dCS5NDG2ZHL0uE0tcaY=
|
|
||||||
github.com/grpc-ecosystem/go-grpc-middleware/v2 v2.0.2-0.20240212192251-757544f21357 h1:Fkzd8ktnpOR9h47SXHe2AYPwelXLH2GjGsjlAloiWfo=
|
github.com/grpc-ecosystem/go-grpc-middleware/v2 v2.0.2-0.20240212192251-757544f21357 h1:Fkzd8ktnpOR9h47SXHe2AYPwelXLH2GjGsjlAloiWfo=
|
||||||
github.com/grpc-ecosystem/go-grpc-middleware/v2 v2.0.2-0.20240212192251-757544f21357/go.mod h1:w9Y7gY31krpLmrVU5ZPG9H7l9fZuRu5/3R3S3FMtVQ4=
|
github.com/grpc-ecosystem/go-grpc-middleware/v2 v2.0.2-0.20240212192251-757544f21357/go.mod h1:w9Y7gY31krpLmrVU5ZPG9H7l9fZuRu5/3R3S3FMtVQ4=
|
||||||
github.com/grpc-ecosystem/grpc-gateway/v2 v2.16.0 h1:YBftPWNWd4WwGqtY2yeZL2ef8rHAxPBD8KFhJpmcqms=
|
github.com/grpc-ecosystem/grpc-gateway/v2 v2.16.0 h1:YBftPWNWd4WwGqtY2yeZL2ef8rHAxPBD8KFhJpmcqms=
|
||||||
@ -513,6 +511,8 @@ github.com/yusufpapurcu/wmi v1.2.4 h1:zFUKzehAFReQwLys1b/iSMl+JQGSCSjtVqQn9bBrPo
|
|||||||
github.com/yusufpapurcu/wmi v1.2.4/go.mod h1:SBZ9tNy3G9/m5Oi98Zks0QjeHVDvuK0qfxQmPyzfmi0=
|
github.com/yusufpapurcu/wmi v1.2.4/go.mod h1:SBZ9tNy3G9/m5Oi98Zks0QjeHVDvuK0qfxQmPyzfmi0=
|
||||||
github.com/zcalusic/sysinfo v1.0.2 h1:nwTTo2a+WQ0NXwo0BGRojOJvJ/5XKvQih+2RrtWqfxc=
|
github.com/zcalusic/sysinfo v1.0.2 h1:nwTTo2a+WQ0NXwo0BGRojOJvJ/5XKvQih+2RrtWqfxc=
|
||||||
github.com/zcalusic/sysinfo v1.0.2/go.mod h1:kluzTYflRWo6/tXVMJPdEjShsbPpsFRyy+p1mBQPC30=
|
github.com/zcalusic/sysinfo v1.0.2/go.mod h1:kluzTYflRWo6/tXVMJPdEjShsbPpsFRyy+p1mBQPC30=
|
||||||
|
go.mongodb.org/mongo-driver v1.16.0 h1:tpRsfBJMROVHKpdGyc1BBEzzjDUWjItxbVSZ8Ls4BQ4=
|
||||||
|
go.mongodb.org/mongo-driver v1.16.0/go.mod h1:oB6AhJQvFQL4LEHyXi6aJzQJtBiTQHiAd83l0GdFaiw=
|
||||||
go.opencensus.io v0.24.0 h1:y73uSU6J157QMP2kn2r30vwW1A2W2WFwSCGnAVxeaD0=
|
go.opencensus.io v0.24.0 h1:y73uSU6J157QMP2kn2r30vwW1A2W2WFwSCGnAVxeaD0=
|
||||||
go.opencensus.io v0.24.0/go.mod h1:vNK8G9p7aAivkbmorf4v+7Hgx+Zs0yY+0fOtgBfjQKo=
|
go.opencensus.io v0.24.0/go.mod h1:vNK8G9p7aAivkbmorf4v+7Hgx+Zs0yY+0fOtgBfjQKo=
|
||||||
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.51.0 h1:Xs2Ncz0gNihqu9iosIZ5SkBbWo5T8JhhLJFMQL1qmLI=
|
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.51.0 h1:Xs2Ncz0gNihqu9iosIZ5SkBbWo5T8JhhLJFMQL1qmLI=
|
||||||
|
@ -97,7 +97,7 @@ func (cc *connContainer) close() {
|
|||||||
type Client struct {
|
type Client struct {
|
||||||
log *log.Entry
|
log *log.Entry
|
||||||
parentCtx context.Context
|
parentCtx context.Context
|
||||||
serverAddress string
|
connectionURL string
|
||||||
hashedID []byte
|
hashedID []byte
|
||||||
|
|
||||||
bufPool *sync.Pool
|
bufPool *sync.Pool
|
||||||
@ -108,20 +108,19 @@ type Client struct {
|
|||||||
mu sync.Mutex // protect serviceIsRunning and conns
|
mu sync.Mutex // protect serviceIsRunning and conns
|
||||||
readLoopMutex sync.Mutex
|
readLoopMutex sync.Mutex
|
||||||
wgReadLoop sync.WaitGroup
|
wgReadLoop sync.WaitGroup
|
||||||
|
instanceURL string
|
||||||
remoteAddr net.Addr
|
|
||||||
|
|
||||||
onDisconnectListener func()
|
onDisconnectListener func()
|
||||||
listenerMutex sync.Mutex
|
listenerMutex sync.Mutex
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewClient creates a new client for the relay server. The client is not connected to the server until the Connect
|
// NewClient creates a new client for the relay server. The client is not connected to the server until the Connect
|
||||||
func NewClient(ctx context.Context, serverAddress, peerID string) *Client {
|
func NewClient(ctx context.Context, serverURL, peerID string) *Client {
|
||||||
hashedID, hashedStringId := messages.HashID(peerID)
|
hashedID, hashedStringId := messages.HashID(peerID)
|
||||||
return &Client{
|
return &Client{
|
||||||
log: log.WithField("client_id", hashedStringId),
|
log: log.WithField("client_id", hashedStringId),
|
||||||
parentCtx: ctx,
|
parentCtx: ctx,
|
||||||
serverAddress: serverAddress,
|
connectionURL: serverURL,
|
||||||
hashedID: hashedID,
|
hashedID: hashedID,
|
||||||
bufPool: &sync.Pool{
|
bufPool: &sync.Pool{
|
||||||
New: func() any {
|
New: func() any {
|
||||||
@ -135,7 +134,7 @@ func NewClient(ctx context.Context, serverAddress, peerID string) *Client {
|
|||||||
|
|
||||||
// Connect establishes a connection to the relay server. It blocks until the connection is established or an error occurs.
|
// Connect establishes a connection to the relay server. It blocks until the connection is established or an error occurs.
|
||||||
func (c *Client) Connect() error {
|
func (c *Client) Connect() error {
|
||||||
c.log.Infof("connecting to relay server: %s", c.serverAddress)
|
c.log.Infof("connecting to relay server: %s", c.connectionURL)
|
||||||
c.readLoopMutex.Lock()
|
c.readLoopMutex.Lock()
|
||||||
defer c.readLoopMutex.Unlock()
|
defer c.readLoopMutex.Unlock()
|
||||||
|
|
||||||
@ -156,7 +155,7 @@ func (c *Client) Connect() error {
|
|||||||
c.wgReadLoop.Add(1)
|
c.wgReadLoop.Add(1)
|
||||||
go c.readLoop(c.relayConn)
|
go c.readLoop(c.relayConn)
|
||||||
|
|
||||||
log.Infof("relay connection established with: %s", c.serverAddress)
|
log.Infof("relay connection established with: %s", c.connectionURL)
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -186,14 +185,14 @@ func (c *Client) OpenConn(dstPeerID string) (net.Conn, error) {
|
|||||||
return conn, nil
|
return conn, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// RelayRemoteAddress returns the IP address of the relay server. It could change after the close and reopen the connection.
|
// ServerInstanceURL returns the address of the relay server. It could change after the close and reopen the connection.
|
||||||
func (c *Client) RelayRemoteAddress() (net.Addr, error) {
|
func (c *Client) ServerInstanceURL() (string, error) {
|
||||||
c.mu.Lock()
|
c.mu.Lock()
|
||||||
defer c.mu.Unlock()
|
defer c.mu.Unlock()
|
||||||
if c.remoteAddr == nil {
|
if c.instanceURL == "" {
|
||||||
return nil, fmt.Errorf("relay connection is not established")
|
return "", fmt.Errorf("relay connection is not established")
|
||||||
}
|
}
|
||||||
return c.remoteAddr, nil
|
return c.instanceURL, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetOnDisconnectListener sets a function that will be called when the connection to the relay server is closed.
|
// SetOnDisconnectListener sets a function that will be called when the connection to the relay server is closed.
|
||||||
@ -215,7 +214,7 @@ func (c *Client) Close() error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (c *Client) connect() error {
|
func (c *Client) connect() error {
|
||||||
conn, err := ws.Dial(c.serverAddress)
|
conn, err := ws.Dial(c.connectionURL)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
@ -231,8 +230,6 @@ func (c *Client) connect() error {
|
|||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
c.remoteAddr = conn.RemoteAddr()
|
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -264,6 +261,12 @@ func (c *Client) handShake() error {
|
|||||||
log.Errorf("unexpected message type: %s", msgType)
|
log.Errorf("unexpected message type: %s", msgType)
|
||||||
return fmt.Errorf("unexpected message type")
|
return fmt.Errorf("unexpected message type")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
domain, err := messages.UnmarshalHelloResponse(buf[:n])
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
c.instanceURL = domain
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -435,7 +438,7 @@ func (c *Client) close(gracefullyExit bool) error {
|
|||||||
c.mu.Unlock()
|
c.mu.Unlock()
|
||||||
|
|
||||||
c.wgReadLoop.Wait()
|
c.wgReadLoop.Wait()
|
||||||
c.log.Infof("relay connection closed with: %s", c.serverAddress)
|
c.log.Infof("relay connection closed with: %s", c.connectionURL)
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -23,8 +23,8 @@ func TestMain(m *testing.M) {
|
|||||||
func TestClient(t *testing.T) {
|
func TestClient(t *testing.T) {
|
||||||
ctx := context.Background()
|
ctx := context.Background()
|
||||||
|
|
||||||
srvCfg := server.Config{Address: "localhost:1234"}
|
srvCfg := server.ListenerConfig{Address: "localhost:1234"}
|
||||||
srv := server.NewServer()
|
srv := server.NewServer(srvCfg.Address, false)
|
||||||
go func() {
|
go func() {
|
||||||
err := srv.Listen(srvCfg)
|
err := srv.Listen(srvCfg)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -91,8 +91,8 @@ func TestClient(t *testing.T) {
|
|||||||
|
|
||||||
func TestRegistration(t *testing.T) {
|
func TestRegistration(t *testing.T) {
|
||||||
ctx := context.Background()
|
ctx := context.Background()
|
||||||
srvCfg := server.Config{Address: "localhost:1234"}
|
srvCfg := server.ListenerConfig{Address: "localhost:1234"}
|
||||||
srv := server.NewServer()
|
srv := server.NewServer(srvCfg.Address, false)
|
||||||
go func() {
|
go func() {
|
||||||
err := srv.Listen(srvCfg)
|
err := srv.Listen(srvCfg)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -156,8 +156,8 @@ func TestEcho(t *testing.T) {
|
|||||||
ctx := context.Background()
|
ctx := context.Background()
|
||||||
idAlice := "alice"
|
idAlice := "alice"
|
||||||
idBob := "bob"
|
idBob := "bob"
|
||||||
srvCfg := server.Config{Address: "localhost:1234"}
|
srvCfg := server.ListenerConfig{Address: "localhost:1234"}
|
||||||
srv := server.NewServer()
|
srv := server.NewServer(srvCfg.Address, false)
|
||||||
go func() {
|
go func() {
|
||||||
err := srv.Listen(srvCfg)
|
err := srv.Listen(srvCfg)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -236,8 +236,8 @@ func TestEcho(t *testing.T) {
|
|||||||
func TestBindToUnavailabePeer(t *testing.T) {
|
func TestBindToUnavailabePeer(t *testing.T) {
|
||||||
ctx := context.Background()
|
ctx := context.Background()
|
||||||
|
|
||||||
srvCfg := server.Config{Address: "localhost:1234"}
|
srvCfg := server.ListenerConfig{Address: "localhost:1234"}
|
||||||
srv := server.NewServer()
|
srv := server.NewServer(srvCfg.Address, false)
|
||||||
go func() {
|
go func() {
|
||||||
err := srv.Listen(srvCfg)
|
err := srv.Listen(srvCfg)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -273,8 +273,8 @@ func TestBindToUnavailabePeer(t *testing.T) {
|
|||||||
func TestBindReconnect(t *testing.T) {
|
func TestBindReconnect(t *testing.T) {
|
||||||
ctx := context.Background()
|
ctx := context.Background()
|
||||||
|
|
||||||
srvCfg := server.Config{Address: "localhost:1234"}
|
srvCfg := server.ListenerConfig{Address: "localhost:1234"}
|
||||||
srv := server.NewServer()
|
srv := server.NewServer(srvCfg.Address, false)
|
||||||
go func() {
|
go func() {
|
||||||
err := srv.Listen(srvCfg)
|
err := srv.Listen(srvCfg)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -355,8 +355,8 @@ func TestBindReconnect(t *testing.T) {
|
|||||||
func TestCloseConn(t *testing.T) {
|
func TestCloseConn(t *testing.T) {
|
||||||
ctx := context.Background()
|
ctx := context.Background()
|
||||||
|
|
||||||
srvCfg := server.Config{Address: "localhost:1234"}
|
srvCfg := server.ListenerConfig{Address: "localhost:1234"}
|
||||||
srv := server.NewServer()
|
srv := server.NewServer(srvCfg.Address, false)
|
||||||
go func() {
|
go func() {
|
||||||
err := srv.Listen(srvCfg)
|
err := srv.Listen(srvCfg)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -403,8 +403,8 @@ func TestCloseConn(t *testing.T) {
|
|||||||
func TestCloseRelayConn(t *testing.T) {
|
func TestCloseRelayConn(t *testing.T) {
|
||||||
ctx := context.Background()
|
ctx := context.Background()
|
||||||
|
|
||||||
srvCfg := server.Config{Address: "localhost:1234"}
|
srvCfg := server.ListenerConfig{Address: "localhost:1234"}
|
||||||
srv := server.NewServer()
|
srv := server.NewServer(srvCfg.Address, false)
|
||||||
go func() {
|
go func() {
|
||||||
err := srv.Listen(srvCfg)
|
err := srv.Listen(srvCfg)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -446,8 +446,8 @@ func TestCloseRelayConn(t *testing.T) {
|
|||||||
func TestCloseByServer(t *testing.T) {
|
func TestCloseByServer(t *testing.T) {
|
||||||
ctx := context.Background()
|
ctx := context.Background()
|
||||||
|
|
||||||
srvCfg := server.Config{Address: "localhost:1234"}
|
srvCfg := server.ListenerConfig{Address: "localhost:1234"}
|
||||||
srv1 := server.NewServer()
|
srv1 := server.NewServer(srvCfg.Address, false)
|
||||||
go func() {
|
go func() {
|
||||||
err := srv1.Listen(srvCfg)
|
err := srv1.Listen(srvCfg)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -489,8 +489,8 @@ func TestCloseByServer(t *testing.T) {
|
|||||||
func TestCloseByClient(t *testing.T) {
|
func TestCloseByClient(t *testing.T) {
|
||||||
ctx := context.Background()
|
ctx := context.Background()
|
||||||
|
|
||||||
srvCfg := server.Config{Address: "localhost:1234"}
|
srvCfg := server.ListenerConfig{Address: "localhost:1234"}
|
||||||
srv := server.NewServer()
|
srv := server.NewServer(srvCfg.Address, false)
|
||||||
go func() {
|
go func() {
|
||||||
err := srv.Listen(srvCfg)
|
err := srv.Listen(srvCfg)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -12,16 +12,12 @@ import (
|
|||||||
type Conn struct {
|
type Conn struct {
|
||||||
ctx context.Context
|
ctx context.Context
|
||||||
*websocket.Conn
|
*websocket.Conn
|
||||||
srvAddr net.Addr
|
|
||||||
localAddr net.Addr
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewConn(wsConn *websocket.Conn, srvAddr, localAddr net.Addr) net.Conn {
|
func NewConn(wsConn *websocket.Conn) net.Conn {
|
||||||
return &Conn{
|
return &Conn{
|
||||||
ctx: context.Background(),
|
ctx: context.Background(),
|
||||||
Conn: wsConn,
|
Conn: wsConn,
|
||||||
srvAddr: srvAddr,
|
|
||||||
localAddr: localAddr,
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -44,11 +40,11 @@ func (c *Conn) Write(b []byte) (n int, err error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (c *Conn) RemoteAddr() net.Addr {
|
func (c *Conn) RemoteAddr() net.Addr {
|
||||||
return c.srvAddr
|
panic("not implemented")
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *Conn) LocalAddr() net.Addr {
|
func (c *Conn) LocalAddr() net.Addr {
|
||||||
return c.localAddr
|
panic("not implemented")
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *Conn) SetReadDeadline(t time.Time) error {
|
func (c *Conn) SetReadDeadline(t time.Time) error {
|
||||||
|
@ -29,22 +29,7 @@ func Dial(address string) (net.Conn, error) {
|
|||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
conn := NewConn(wsConn)
|
||||||
response.Body.(net.Conn).LocalAddr()
|
|
||||||
unc, ok := response.Body.(net.Conn)
|
|
||||||
if !ok {
|
|
||||||
log.Errorf("failed to get local address: %s", err)
|
|
||||||
return nil, fmt.Errorf("failed to get local address")
|
|
||||||
}
|
|
||||||
|
|
||||||
*/
|
|
||||||
// todo figure out the proper address
|
|
||||||
dummy := &net.TCPAddr{
|
|
||||||
IP: net.ParseIP("127.0.0.1"),
|
|
||||||
Port: 8080,
|
|
||||||
}
|
|
||||||
|
|
||||||
conn := NewConn(wsConn, dummy, dummy)
|
|
||||||
return conn, nil
|
return conn, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -35,9 +35,9 @@ func NewRelayTrack() *RelayTrack {
|
|||||||
// relay servers will be closed if there is no active connection. Periodically the manager will check if there is any
|
// relay servers will be closed if there is no active connection. Periodically the manager will check if there is any
|
||||||
// unused relay connection and close it.
|
// unused relay connection and close it.
|
||||||
type Manager struct {
|
type Manager struct {
|
||||||
ctx context.Context
|
ctx context.Context
|
||||||
srvAddress string
|
serverURL string
|
||||||
peerID string
|
peerID string
|
||||||
|
|
||||||
relayClient *Client
|
relayClient *Client
|
||||||
reconnectGuard *Guard
|
reconnectGuard *Guard
|
||||||
@ -49,10 +49,10 @@ type Manager struct {
|
|||||||
listenerLock sync.Mutex
|
listenerLock sync.Mutex
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewManager(ctx context.Context, serverAddress string, peerID string) *Manager {
|
func NewManager(ctx context.Context, serverURL string, peerID string) *Manager {
|
||||||
return &Manager{
|
return &Manager{
|
||||||
ctx: ctx,
|
ctx: ctx,
|
||||||
srvAddress: serverAddress,
|
serverURL: serverURL,
|
||||||
peerID: peerID,
|
peerID: peerID,
|
||||||
relayClients: make(map[string]*RelayTrack),
|
relayClients: make(map[string]*RelayTrack),
|
||||||
onDisconnectedListeners: make(map[string]map[*func()]struct{}),
|
onDisconnectedListeners: make(map[string]map[*func()]struct{}),
|
||||||
@ -65,7 +65,7 @@ func (m *Manager) Serve() error {
|
|||||||
return fmt.Errorf("manager already serving")
|
return fmt.Errorf("manager already serving")
|
||||||
}
|
}
|
||||||
|
|
||||||
m.relayClient = NewClient(m.ctx, m.srvAddress, m.peerID)
|
m.relayClient = NewClient(m.ctx, m.serverURL, m.peerID)
|
||||||
err := m.relayClient.Connect()
|
err := m.relayClient.Connect()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Errorf("failed to connect to relay server: %s", err)
|
log.Errorf("failed to connect to relay server: %s", err)
|
||||||
@ -74,7 +74,7 @@ func (m *Manager) Serve() error {
|
|||||||
|
|
||||||
m.reconnectGuard = NewGuard(m.ctx, m.relayClient)
|
m.reconnectGuard = NewGuard(m.ctx, m.relayClient)
|
||||||
m.relayClient.SetOnDisconnectListener(func() {
|
m.relayClient.SetOnDisconnectListener(func() {
|
||||||
m.onServerDisconnected(m.srvAddress)
|
m.onServerDisconnected(m.serverURL)
|
||||||
})
|
})
|
||||||
m.startCleanupLoop()
|
m.startCleanupLoop()
|
||||||
|
|
||||||
@ -116,17 +116,17 @@ func (m *Manager) OpenConn(serverAddress, peerKey string, onClosedListener func(
|
|||||||
return netConn, err
|
return netConn, err
|
||||||
}
|
}
|
||||||
|
|
||||||
// RelayAddress returns the address of the permanent relay server. It could change if the network connection is lost.
|
// RelayInstanceAddress returns the address of the permanent relay server. It could change if the network connection is lost.
|
||||||
// This address will be sent to the target peer to choose the common relay server for the communication.
|
// This address will be sent to the target peer to choose the common relay server for the communication.
|
||||||
func (m *Manager) RelayAddress() (net.Addr, error) {
|
func (m *Manager) RelayInstanceAddress() (string, error) {
|
||||||
if m.relayClient == nil {
|
if m.relayClient == nil {
|
||||||
return nil, errRelayClientNotConnected
|
return "", errRelayClientNotConnected
|
||||||
}
|
}
|
||||||
return m.relayClient.RelayRemoteAddress()
|
return m.relayClient.ServerInstanceURL()
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *Manager) HasRelayAddress() bool {
|
func (m *Manager) HasRelayAddress() bool {
|
||||||
return m.srvAddress != ""
|
return m.serverURL != ""
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *Manager) openConnVia(serverAddress, peerKey string) (net.Conn, error) {
|
func (m *Manager) openConnVia(serverAddress, peerKey string) (net.Conn, error) {
|
||||||
@ -182,7 +182,7 @@ func (m *Manager) openConnVia(serverAddress, peerKey string) (net.Conn, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (m *Manager) onServerDisconnected(serverAddress string) {
|
func (m *Manager) onServerDisconnected(serverAddress string) {
|
||||||
if serverAddress == m.srvAddress {
|
if serverAddress == m.serverURL {
|
||||||
m.reconnectGuard.OnDisconnected()
|
m.reconnectGuard.OnDisconnected()
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -190,11 +190,11 @@ func (m *Manager) onServerDisconnected(serverAddress string) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (m *Manager) isForeignServer(address string) (bool, error) {
|
func (m *Manager) isForeignServer(address string) (bool, error) {
|
||||||
rAddr, err := m.relayClient.RelayRemoteAddress()
|
rAddr, err := m.relayClient.ServerInstanceURL()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false, fmt.Errorf("relay client not connected")
|
return false, fmt.Errorf("relay client not connected")
|
||||||
}
|
}
|
||||||
return rAddr.String() != address, nil
|
return rAddr != address, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *Manager) startCleanupLoop() {
|
func (m *Manager) startCleanupLoop() {
|
||||||
|
@ -13,10 +13,10 @@ import (
|
|||||||
func TestForeignConn(t *testing.T) {
|
func TestForeignConn(t *testing.T) {
|
||||||
ctx := context.Background()
|
ctx := context.Background()
|
||||||
|
|
||||||
srvCfg1 := server.Config{
|
srvCfg1 := server.ListenerConfig{
|
||||||
Address: "localhost:1234",
|
Address: "localhost:1234",
|
||||||
}
|
}
|
||||||
srv1 := server.NewServer()
|
srv1 := server.NewServer(srvCfg1.Address, false)
|
||||||
go func() {
|
go func() {
|
||||||
err := srv1.Listen(srvCfg1)
|
err := srv1.Listen(srvCfg1)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -31,10 +31,10 @@ func TestForeignConn(t *testing.T) {
|
|||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
|
|
||||||
srvCfg2 := server.Config{
|
srvCfg2 := server.ListenerConfig{
|
||||||
Address: "localhost:2234",
|
Address: "localhost:2234",
|
||||||
}
|
}
|
||||||
srv2 := server.NewServer()
|
srv2 := server.NewServer(srvCfg2.Address, false)
|
||||||
go func() {
|
go func() {
|
||||||
err := srv2.Listen(srvCfg2)
|
err := srv2.Listen(srvCfg2)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -61,15 +61,15 @@ func TestForeignConn(t *testing.T) {
|
|||||||
clientBob := NewManager(mCtx, srvCfg2.Address, idBob)
|
clientBob := NewManager(mCtx, srvCfg2.Address, idBob)
|
||||||
clientBob.Serve()
|
clientBob.Serve()
|
||||||
|
|
||||||
bobsSrvAddr, err := clientBob.RelayAddress()
|
bobsSrvAddr, err := clientBob.RelayInstanceAddress()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("failed to get relay address: %s", err)
|
t.Fatalf("failed to get relay address: %s", err)
|
||||||
}
|
}
|
||||||
connAliceToBob, err := clientAlice.OpenConn(bobsSrvAddr.String(), idBob, nil)
|
connAliceToBob, err := clientAlice.OpenConn(bobsSrvAddr, idBob, nil)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("failed to bind channel: %s", err)
|
t.Fatalf("failed to bind channel: %s", err)
|
||||||
}
|
}
|
||||||
connBobToAlice, err := clientBob.OpenConn(bobsSrvAddr.String(), idAlice, nil)
|
connBobToAlice, err := clientBob.OpenConn(bobsSrvAddr, idAlice, nil)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("failed to bind channel: %s", err)
|
t.Fatalf("failed to bind channel: %s", err)
|
||||||
}
|
}
|
||||||
@ -104,10 +104,10 @@ func TestForeignConn(t *testing.T) {
|
|||||||
func TestForeginConnClose(t *testing.T) {
|
func TestForeginConnClose(t *testing.T) {
|
||||||
ctx := context.Background()
|
ctx := context.Background()
|
||||||
|
|
||||||
srvCfg1 := server.Config{
|
srvCfg1 := server.ListenerConfig{
|
||||||
Address: "localhost:1234",
|
Address: "localhost:1234",
|
||||||
}
|
}
|
||||||
srv1 := server.NewServer()
|
srv1 := server.NewServer(srvCfg1.Address, false)
|
||||||
go func() {
|
go func() {
|
||||||
err := srv1.Listen(srvCfg1)
|
err := srv1.Listen(srvCfg1)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -122,10 +122,10 @@ func TestForeginConnClose(t *testing.T) {
|
|||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
|
|
||||||
srvCfg2 := server.Config{
|
srvCfg2 := server.ListenerConfig{
|
||||||
Address: "localhost:2234",
|
Address: "localhost:2234",
|
||||||
}
|
}
|
||||||
srv2 := server.NewServer()
|
srv2 := server.NewServer(srvCfg2.Address, false)
|
||||||
go func() {
|
go func() {
|
||||||
err := srv2.Listen(srvCfg2)
|
err := srv2.Listen(srvCfg2)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -161,10 +161,10 @@ func TestForeginConnClose(t *testing.T) {
|
|||||||
func TestForeginAutoClose(t *testing.T) {
|
func TestForeginAutoClose(t *testing.T) {
|
||||||
ctx := context.Background()
|
ctx := context.Background()
|
||||||
relayCleanupInterval = 1 * time.Second
|
relayCleanupInterval = 1 * time.Second
|
||||||
srvCfg1 := server.Config{
|
srvCfg1 := server.ListenerConfig{
|
||||||
Address: "localhost:1234",
|
Address: "localhost:1234",
|
||||||
}
|
}
|
||||||
srv1 := server.NewServer()
|
srv1 := server.NewServer(srvCfg1.Address, false)
|
||||||
go func() {
|
go func() {
|
||||||
t.Log("binding server 1.")
|
t.Log("binding server 1.")
|
||||||
err := srv1.Listen(srvCfg1)
|
err := srv1.Listen(srvCfg1)
|
||||||
@ -182,10 +182,10 @@ func TestForeginAutoClose(t *testing.T) {
|
|||||||
t.Logf("server 1. closed")
|
t.Logf("server 1. closed")
|
||||||
}()
|
}()
|
||||||
|
|
||||||
srvCfg2 := server.Config{
|
srvCfg2 := server.ListenerConfig{
|
||||||
Address: "localhost:2234",
|
Address: "localhost:2234",
|
||||||
}
|
}
|
||||||
srv2 := server.NewServer()
|
srv2 := server.NewServer(srvCfg2.Address, false)
|
||||||
go func() {
|
go func() {
|
||||||
t.Log("binding server 2.")
|
t.Log("binding server 2.")
|
||||||
err := srv2.Listen(srvCfg2)
|
err := srv2.Listen(srvCfg2)
|
||||||
@ -234,10 +234,10 @@ func TestAutoReconnect(t *testing.T) {
|
|||||||
ctx := context.Background()
|
ctx := context.Background()
|
||||||
reconnectingTimeout = 2 * time.Second
|
reconnectingTimeout = 2 * time.Second
|
||||||
|
|
||||||
srvCfg := server.Config{
|
srvCfg := server.ListenerConfig{
|
||||||
Address: "localhost:1234",
|
Address: "localhost:1234",
|
||||||
}
|
}
|
||||||
srv := server.NewServer()
|
srv := server.NewServer(srvCfg.Address, false)
|
||||||
go func() {
|
go func() {
|
||||||
err := srv.Listen(srvCfg)
|
err := srv.Listen(srvCfg)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -256,11 +256,11 @@ func TestAutoReconnect(t *testing.T) {
|
|||||||
defer cancel()
|
defer cancel()
|
||||||
clientAlice := NewManager(mCtx, srvCfg.Address, "alice")
|
clientAlice := NewManager(mCtx, srvCfg.Address, "alice")
|
||||||
clientAlice.Serve()
|
clientAlice.Serve()
|
||||||
ra, err := clientAlice.RelayAddress()
|
ra, err := clientAlice.RelayInstanceAddress()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Errorf("failed to get relay address: %s", err)
|
t.Errorf("failed to get relay address: %s", err)
|
||||||
}
|
}
|
||||||
conn, err := clientAlice.OpenConn(ra.String(), "bob", nil)
|
conn, err := clientAlice.OpenConn(ra, "bob", nil)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Errorf("failed to bind channel: %s", err)
|
t.Errorf("failed to bind channel: %s", err)
|
||||||
}
|
}
|
||||||
@ -278,7 +278,7 @@ func TestAutoReconnect(t *testing.T) {
|
|||||||
time.Sleep(reconnectingTimeout + 1*time.Second)
|
time.Sleep(reconnectingTimeout + 1*time.Second)
|
||||||
|
|
||||||
log.Infof("reopent the connection")
|
log.Infof("reopent the connection")
|
||||||
_, err = clientAlice.OpenConn(ra.String(), "bob", nil)
|
_, err = clientAlice.OpenConn(ra, "bob", nil)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Errorf("failed to open channel: %s", err)
|
t.Errorf("failed to open channel: %s", err)
|
||||||
}
|
}
|
||||||
|
@ -16,9 +16,11 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
listenAddress string
|
listenAddress string
|
||||||
|
// in HA every peer connect to a common domain, the instance domain has been distributed during the p2p connection
|
||||||
|
exposedAddress string
|
||||||
letsencryptDataDir string
|
letsencryptDataDir string
|
||||||
letsencryptDomain string
|
letsencryptDomains []string
|
||||||
|
|
||||||
rootCmd = &cobra.Command{
|
rootCmd = &cobra.Command{
|
||||||
Use: "relay",
|
Use: "relay",
|
||||||
@ -31,8 +33,9 @@ var (
|
|||||||
func init() {
|
func init() {
|
||||||
_ = util.InitLog("trace", "console")
|
_ = util.InitLog("trace", "console")
|
||||||
rootCmd.PersistentFlags().StringVarP(&listenAddress, "listen-address", "l", ":1235", "listen address")
|
rootCmd.PersistentFlags().StringVarP(&listenAddress, "listen-address", "l", ":1235", "listen address")
|
||||||
|
rootCmd.PersistentFlags().StringVarP(&exposedAddress, "exposed-address", "e", "", "instance domain address (or ip) and port, it will be distributes between peers")
|
||||||
rootCmd.PersistentFlags().StringVarP(&letsencryptDataDir, "letsencrypt-data-dir", "d", "", "a directory to store Let's Encrypt data. Required if Let's Encrypt is enabled.")
|
rootCmd.PersistentFlags().StringVarP(&letsencryptDataDir, "letsencrypt-data-dir", "d", "", "a directory to store Let's Encrypt data. Required if Let's Encrypt is enabled.")
|
||||||
rootCmd.PersistentFlags().StringVarP(&letsencryptDomain, "letsencrypt-domain", "a", "", "a domain to issue Let's Encrypt certificate for. Enables TLS using Let's Encrypt. Will fetch and renew certificate, and run the server with TLS")
|
rootCmd.PersistentFlags().StringArrayVarP(&letsencryptDomains, "letsencrypt-domains", "a", nil, "list of domains to issue Let's Encrypt certificate for. Enables TLS using Let's Encrypt. Will fetch and renew certificate, and run the server with TLS")
|
||||||
}
|
}
|
||||||
|
|
||||||
func waitForExitSignal() {
|
func waitForExitSignal() {
|
||||||
@ -42,7 +45,7 @@ func waitForExitSignal() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func execute(cmd *cobra.Command, args []string) {
|
func execute(cmd *cobra.Command, args []string) {
|
||||||
srvCfg := server.Config{
|
srvListenerCfg := server.ListenerConfig{
|
||||||
Address: listenAddress,
|
Address: listenAddress,
|
||||||
}
|
}
|
||||||
if hasLetsEncrypt() {
|
if hasLetsEncrypt() {
|
||||||
@ -51,11 +54,12 @@ func execute(cmd *cobra.Command, args []string) {
|
|||||||
log.Errorf("%s", err)
|
log.Errorf("%s", err)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
srvCfg.TLSConfig = tlscfg
|
srvListenerCfg.TLSConfig = tlscfg
|
||||||
}
|
}
|
||||||
|
|
||||||
srv := server.NewServer()
|
tlsSupport := srvListenerCfg.TLSConfig != nil
|
||||||
err := srv.Listen(srvCfg)
|
srv := server.NewServer(exposedAddress, tlsSupport)
|
||||||
|
err := srv.Listen(srvListenerCfg)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Errorf("failed to bind server: %s", err)
|
log.Errorf("failed to bind server: %s", err)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
@ -71,11 +75,11 @@ func execute(cmd *cobra.Command, args []string) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func hasLetsEncrypt() bool {
|
func hasLetsEncrypt() bool {
|
||||||
return letsencryptDataDir != "" && letsencryptDomain != ""
|
return letsencryptDataDir != "" && letsencryptDomains != nil && len(letsencryptDomains) > 0
|
||||||
}
|
}
|
||||||
|
|
||||||
func setupTLS() (*tls.Config, error) {
|
func setupTLS() (*tls.Config, error) {
|
||||||
certManager, err := encryption.CreateCertManager(letsencryptDataDir, letsencryptDomain)
|
certManager, err := encryption.CreateCertManager(letsencryptDataDir, letsencryptDomains...)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("failed creating LetsEncrypt cert manager: %v", err)
|
return nil, fmt.Errorf("failed creating LetsEncrypt cert manager: %v", err)
|
||||||
}
|
}
|
||||||
|
@ -4,6 +4,8 @@ import (
|
|||||||
"bytes"
|
"bytes"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
|
||||||
|
"go.mongodb.org/mongo-driver/bson"
|
||||||
|
|
||||||
log "github.com/sirupsen/logrus"
|
log "github.com/sirupsen/logrus"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -45,6 +47,10 @@ func (m MsgType) String() string {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type HelloResponse struct {
|
||||||
|
DomainAddress string
|
||||||
|
}
|
||||||
|
|
||||||
func DetermineClientMsgType(msg []byte) (MsgType, error) {
|
func DetermineClientMsgType(msg []byte) (MsgType, error) {
|
||||||
msgType := MsgType(msg[0])
|
msgType := MsgType(msg[0])
|
||||||
switch msgType {
|
switch msgType {
|
||||||
@ -97,10 +103,32 @@ func UnmarshalHelloMsg(msg []byte) ([]byte, error) {
|
|||||||
return msg[5:], nil
|
return msg[5:], nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func MarshalHelloResponse() []byte {
|
func MarshalHelloResponse(DomainAddress string) ([]byte, error) {
|
||||||
msg := make([]byte, 1)
|
payload := HelloResponse{
|
||||||
|
DomainAddress: DomainAddress,
|
||||||
|
}
|
||||||
|
helloResponse, err := bson.Marshal(payload)
|
||||||
|
if err != nil {
|
||||||
|
log.Errorf("failed to marshal hello response: %s", err)
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
msg := make([]byte, 1, 1+len(helloResponse))
|
||||||
msg[0] = byte(MsgTypeHelloResponse)
|
msg[0] = byte(MsgTypeHelloResponse)
|
||||||
return msg
|
msg = append(msg, helloResponse...)
|
||||||
|
return msg, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func UnmarshalHelloResponse(msg []byte) (string, error) {
|
||||||
|
if len(msg) < 2 {
|
||||||
|
return "", fmt.Errorf("invalid 'hello response' message")
|
||||||
|
}
|
||||||
|
payload := HelloResponse{}
|
||||||
|
err := bson.Unmarshal(msg[1:], &payload)
|
||||||
|
if err != nil {
|
||||||
|
log.Errorf("failed to unmarshal hello response: %s", err)
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
return payload.DomainAddress, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Close message
|
// Close message
|
||||||
|
@ -12,16 +12,24 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
type Relay struct {
|
type Relay struct {
|
||||||
store *Store
|
store *Store
|
||||||
|
instaceURL string // domain:port
|
||||||
|
|
||||||
closed bool
|
closed bool
|
||||||
closeMu sync.RWMutex
|
closeMu sync.RWMutex
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewRelay() *Relay {
|
func NewRelay(exposedAddress string, tlsSupport bool) *Relay {
|
||||||
return &Relay{
|
r := &Relay{
|
||||||
store: NewStore(),
|
store: NewStore(),
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if tlsSupport {
|
||||||
|
r.instaceURL = fmt.Sprintf("rels://%s", exposedAddress)
|
||||||
|
} else {
|
||||||
|
r.instaceURL = fmt.Sprintf("rel://%s", exposedAddress)
|
||||||
|
}
|
||||||
|
return r
|
||||||
}
|
}
|
||||||
|
|
||||||
func (r *Relay) Accept(conn net.Conn) {
|
func (r *Relay) Accept(conn net.Conn) {
|
||||||
@ -31,7 +39,7 @@ func (r *Relay) Accept(conn net.Conn) {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
peerID, err := handShake(conn)
|
peerID, err := r.handShake(conn)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Errorf("failed to handshake with %s: %s", conn.RemoteAddr(), err)
|
log.Errorf("failed to handshake with %s: %s", conn.RemoteAddr(), err)
|
||||||
cErr := conn.Close()
|
cErr := conn.Close()
|
||||||
@ -68,7 +76,7 @@ func (r *Relay) Close(ctx context.Context) {
|
|||||||
r.closeMu.Unlock()
|
r.closeMu.Unlock()
|
||||||
}
|
}
|
||||||
|
|
||||||
func handShake(conn net.Conn) ([]byte, error) {
|
func (r *Relay) handShake(conn net.Conn) ([]byte, error) {
|
||||||
buf := make([]byte, messages.MaxHandshakeSize)
|
buf := make([]byte, messages.MaxHandshakeSize)
|
||||||
n, err := conn.Read(buf)
|
n, err := conn.Read(buf)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -79,18 +87,20 @@ func handShake(conn net.Conn) ([]byte, error) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
if msgType != messages.MsgTypeHello {
|
if msgType != messages.MsgTypeHello {
|
||||||
tErr := fmt.Errorf("invalid message type")
|
tErr := fmt.Errorf("invalid message type")
|
||||||
log.Errorf("failed to handshake: %s", tErr)
|
log.Errorf("failed to handshake: %s", tErr)
|
||||||
return nil, tErr
|
return nil, tErr
|
||||||
}
|
}
|
||||||
|
|
||||||
peerID, err := messages.UnmarshalHelloMsg(buf[:n])
|
peerID, err := messages.UnmarshalHelloMsg(buf[:n])
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Errorf("failed to handshake: %s", err)
|
log.Errorf("failed to handshake: %s", err)
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
msg := messages.MarshalHelloResponse()
|
msg, _ := messages.MarshalHelloResponse(r.instaceURL)
|
||||||
_, err = conn.Write(msg)
|
_, err = conn.Write(msg)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
@ -14,7 +14,7 @@ import (
|
|||||||
"github.com/netbirdio/netbird/relay/server/listener/ws"
|
"github.com/netbirdio/netbird/relay/server/listener/ws"
|
||||||
)
|
)
|
||||||
|
|
||||||
type Config struct {
|
type ListenerConfig struct {
|
||||||
Address string
|
Address string
|
||||||
TLSConfig *tls.Config
|
TLSConfig *tls.Config
|
||||||
}
|
}
|
||||||
@ -25,13 +25,13 @@ type Server struct {
|
|||||||
wSListener listener.Listener
|
wSListener listener.Listener
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewServer() *Server {
|
func NewServer(exposedAddress string, tlsSupport bool) *Server {
|
||||||
return &Server{
|
return &Server{
|
||||||
relay: NewRelay(),
|
relay: NewRelay(exposedAddress, tlsSupport),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (r *Server) Listen(cfg Config) error {
|
func (r *Server) Listen(cfg ListenerConfig) error {
|
||||||
wg := sync.WaitGroup{}
|
wg := sync.WaitGroup{}
|
||||||
wg.Add(2)
|
wg.Add(2)
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user