main.go 2.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132
  1. package server
  2. import (
  3. log "code.google.com/p/log4go"
  4. "flag"
  5. "fmt"
  6. "net"
  7. "ngrok"
  8. "ngrok/conn"
  9. "ngrok/proto"
  10. "regexp"
  11. )
  12. type Options struct {
  13. publicPort int
  14. proxyPort int
  15. tunnelPort int
  16. domain string
  17. }
  18. /* GLOBALS */
  19. var (
  20. hostRegex *regexp.Regexp
  21. version string = "0.1"
  22. proxyAddr string
  23. tunnels *TunnelManager
  24. )
  25. func init() {
  26. hostRegex = regexp.MustCompile("[H|h]ost: ([^\\(\\);:,<>]+)\n")
  27. }
  28. func parseArgs() *Options {
  29. publicPort := flag.Int("publicport", 80, "Public port")
  30. tunnelPort := flag.Int("tunnelport", 2280, "Tunnel port")
  31. proxyPort := flag.Int("proxyPort", 0, "Proxy port")
  32. domain := flag.String("domain", "ngrok.com", "Domain where the tunnels are hosted")
  33. flag.Parse()
  34. return &Options{
  35. publicPort: *publicPort,
  36. tunnelPort: *tunnelPort,
  37. proxyPort: *proxyPort,
  38. domain: *domain,
  39. }
  40. }
  41. func getTCPPort(addr net.Addr) int {
  42. return addr.(*net.TCPAddr).Port
  43. }
  44. /**
  45. * Listens for new control connections from tunnel clients
  46. */
  47. func controlListener(addr *net.TCPAddr, domain string) {
  48. // listen for incoming connections
  49. listener, err := net.ListenTCP("tcp", addr)
  50. if err != nil {
  51. panic(err)
  52. }
  53. log.Info("Listening for control connections on %d", getTCPPort(addr))
  54. for {
  55. tcpConn, err := listener.AcceptTCP()
  56. if err != nil {
  57. panic(err)
  58. }
  59. NewControl(tcpConn)
  60. }
  61. }
  62. /**
  63. * Listens for new proxy connections from tunnel clients
  64. */
  65. func proxyListener(addr *net.TCPAddr, domain string) {
  66. listener, err := net.ListenTCP("tcp", addr)
  67. proxyAddr = fmt.Sprintf("%s:%d", domain, getTCPPort(listener.Addr()))
  68. if err != nil {
  69. panic(err)
  70. }
  71. log.Info("Listening for proxy connection on %d", getTCPPort(listener.Addr()))
  72. for {
  73. tcpConn, err := listener.AcceptTCP()
  74. if err != nil {
  75. panic(err)
  76. }
  77. conn := conn.NewLogged(tcpConn, "pxy")
  78. go func() {
  79. defer func() {
  80. if r := recover(); r != nil {
  81. conn.Warn("Failed with error: %v", r)
  82. conn.Close()
  83. }
  84. }()
  85. var regPxy proto.RegProxyMsg
  86. if err = proto.ReadMsgInto(conn, &regPxy); err != nil {
  87. panic(err)
  88. }
  89. conn.Info("Registering new proxy for %s", regPxy.Url)
  90. tunnel := tunnels.Get(regPxy.Url)
  91. if tunnel == nil {
  92. panic("No tunnel found for: " + regPxy.Url)
  93. }
  94. tunnel.RegisterProxy(conn)
  95. }()
  96. }
  97. }
  98. func Main() {
  99. ngrok.LogToConsole()
  100. done := make(chan int)
  101. // parse options
  102. opts := parseArgs()
  103. tunnels = NewTunnelManager(opts.domain)
  104. go proxyListener(&net.TCPAddr{net.ParseIP("0.0.0.0"), opts.proxyPort}, opts.domain)
  105. go controlListener(&net.TCPAddr{net.ParseIP("0.0.0.0"), opts.tunnelPort}, opts.domain)
  106. go httpListener(&net.TCPAddr{net.ParseIP("0.0.0.0"), opts.publicPort})
  107. <-done
  108. }