mirror of
https://github.com/Start9Labs/start-os.git
synced 2026-03-30 12:11:56 +00:00
* add support for inbound proxies * backend changes * fix file type * proxy -> tunnel, implement backend apis * wip start-tunneld * add domains and gateways, remove routers, fix docs links * dont show hidden actions * show and test dns * edit instead of chnage acme and change gateway * refactor: domains page * refactor: gateways page * domains and acme refactor * certificate authorities * refactor public/private gateways * fix fe types * domains mostly finished * refactor: add file control to form service * add ip util to sdk * domains api + migration * start service interface page, WIP * different options for clearnet domains * refactor: styles for interfaces page * minor * better placeholder for no addresses * start sorting addresses * best address logic * comments * fix unnecessary export * MVP of service interface page * domains preferred * fix: address comments * only translations left * wip: start-tunnel & fix build * forms for adding domain, rework things based on new ideas * fix: dns testing * public domain, max width, descriptions for dns * nix StartOS domains, implement public and private domains at interface scope * restart tor instead of reset * better icon for restart tor * dns * fix sort functions for public and private domains * with todos * update types * clean up tech debt, bump dependencies * revert to ts-rs v9 * fix all types * fix dns form * add missing translations * it builds * fix: comments (#3009) * fix: comments * undo default --------- Co-authored-by: Matt Hill <mattnine@protonmail.com> * fix: refactor legacy components (#3010) * fix: comments * fix: refactor legacy components * remove default again --------- Co-authored-by: Matt Hill <mattnine@protonmail.com> * more translations * wip * fix deadlock * coukd work * simple renaming * placeholder for empty service interfaces table * honor hidden form values * remove logs * reason instead of description * fix dns * misc fixes * implement toggling gateways for service interface * fix showing dns records * move status column in service list * remove unnecessary truthy check * refactor: refactor forms components and remove legacy Taiga UI package (#3012) * handle wh file uploads * wip: debugging tor * socks5 proxy working * refactor: fix multiple comments (#3013) * refactor: fix multiple comments * styling changes, add documentation to sidebar * translations for dns page * refactor: subtle colors * rearrange service page --------- Co-authored-by: Matt Hill <mattnine@protonmail.com> * fix file_stream and remove non-terminating test * clean up logs * support for sccache * fix gha sccache * more marketplace translations * install wizard clarity * stub hostnameInfo in migration * fix address info after setup, fix styling on SI page, new 040 release notes * remove tor logs from os * misc fixes * reset tor still not functioning... * update ts * minor styling and wording * chore: some fixes (#3015) * fix gateway renames * different handling for public domains * styling fixes * whole navbar should not be clickable on service show page * timeout getState request * remove links from changelog * misc fixes from pairing * use custom name for gateway in more places * fix dns parsing * closes #3003 * closes #2999 * chore: some fixes (#3017) * small copy change * revert hardcoded error for testing * dont require port forward if gateway is public * use old wan ip when not available * fix .const hanging on undefined * fix test * fix doc test * fix renames * update deps * allow specifying dependency metadata directly * temporarily make dependencies not cliackable in marketplace listings * fix socks bind * fix test --------- Co-authored-by: Aiden McClelland <me@drbonez.dev> Co-authored-by: waterplea <alexander@inkin.ru>
177 lines
10 KiB
Rust
177 lines
10 KiB
Rust
use std::net::{Ipv4Addr, SocketAddr, SocketAddrV4};
|
|
use std::sync::Arc;
|
|
use std::time::Duration;
|
|
|
|
use helpers::NonDetachingJoinHandle;
|
|
use socks5_impl::protocol::{Address, Reply};
|
|
use socks5_impl::server::auth::NoAuth;
|
|
use socks5_impl::server::{AuthAdaptor, ClientConnection, Server};
|
|
use tokio::net::{TcpListener, TcpStream};
|
|
|
|
use crate::net::tor::TorController;
|
|
use crate::prelude::*;
|
|
use crate::util::actor::background::BackgroundJobQueue;
|
|
use crate::HOST_IP;
|
|
|
|
pub const DEFAULT_SOCKS_LISTEN: SocketAddr = SocketAddr::V4(SocketAddrV4::new(
|
|
Ipv4Addr::new(HOST_IP[0], HOST_IP[1], HOST_IP[2], HOST_IP[3]),
|
|
9050,
|
|
));
|
|
|
|
pub struct SocksController {
|
|
_thread: NonDetachingJoinHandle<()>,
|
|
}
|
|
impl SocksController {
|
|
pub fn new(listen: SocketAddr, tor: TorController) -> Result<Self, Error> {
|
|
Ok(Self {
|
|
_thread: tokio::spawn(async move {
|
|
let auth: AuthAdaptor<()> = Arc::new(NoAuth);
|
|
let listener;
|
|
loop {
|
|
if let Some(l) = TcpListener::bind(listen)
|
|
.await
|
|
.with_kind(ErrorKind::Network)
|
|
.log_err()
|
|
{
|
|
listener = l;
|
|
break;
|
|
}
|
|
tokio::time::sleep(Duration::from_secs(1)).await;
|
|
}
|
|
let (bg, mut runner) = BackgroundJobQueue::new();
|
|
runner
|
|
.run_while(async {
|
|
let server = Server::new(listener, auth);
|
|
loop {
|
|
match server.accept().await {
|
|
Ok((stream, _)) => {
|
|
let tor = tor.clone();
|
|
bg.add_job(async move {
|
|
if let Err(e) = async {
|
|
match stream
|
|
.authenticate()
|
|
.await
|
|
.with_kind(ErrorKind::Network)?
|
|
.0
|
|
.wait_request()
|
|
.await
|
|
.with_kind(ErrorKind::Network)?
|
|
{
|
|
ClientConnection::Connect(
|
|
reply,
|
|
Address::DomainAddress(domain, port),
|
|
) if domain.ends_with(".onion") => {
|
|
if let Ok(mut target) = tor
|
|
.connect_onion(&domain.parse()?, port)
|
|
.await
|
|
{
|
|
let mut sock = reply
|
|
.reply(
|
|
Reply::Succeeded,
|
|
Address::unspecified(),
|
|
)
|
|
.await
|
|
.with_kind(ErrorKind::Network)?;
|
|
tokio::io::copy_bidirectional(
|
|
&mut sock,
|
|
&mut target,
|
|
)
|
|
.await
|
|
.with_kind(ErrorKind::Network)?;
|
|
} else {
|
|
let mut sock = reply
|
|
.reply(
|
|
Reply::HostUnreachable,
|
|
Address::unspecified(),
|
|
)
|
|
.await
|
|
.with_kind(ErrorKind::Network)?;
|
|
sock.shutdown()
|
|
.await
|
|
.with_kind(ErrorKind::Network)?;
|
|
}
|
|
}
|
|
ClientConnection::Connect(reply, addr) => {
|
|
if let Ok(mut target) = match addr {
|
|
Address::DomainAddress(domain, port) => {
|
|
TcpStream::connect((domain, port)).await
|
|
}
|
|
Address::SocketAddress(addr) => {
|
|
TcpStream::connect(addr).await
|
|
}
|
|
} {
|
|
let mut sock = reply
|
|
.reply(
|
|
Reply::Succeeded,
|
|
Address::unspecified(),
|
|
)
|
|
.await
|
|
.with_kind(ErrorKind::Network)?;
|
|
tokio::io::copy_bidirectional(
|
|
&mut sock,
|
|
&mut target,
|
|
)
|
|
.await
|
|
.with_kind(ErrorKind::Network)?;
|
|
} else {
|
|
let mut sock = reply
|
|
.reply(
|
|
Reply::HostUnreachable,
|
|
Address::unspecified(),
|
|
)
|
|
.await
|
|
.with_kind(ErrorKind::Network)?;
|
|
sock.shutdown()
|
|
.await
|
|
.with_kind(ErrorKind::Network)?;
|
|
}
|
|
}
|
|
ClientConnection::Bind(bind, _) => {
|
|
let mut sock = bind
|
|
.reply(
|
|
Reply::CommandNotSupported,
|
|
Address::unspecified(),
|
|
)
|
|
.await
|
|
.with_kind(ErrorKind::Network)?;
|
|
sock.shutdown()
|
|
.await
|
|
.with_kind(ErrorKind::Network)?;
|
|
}
|
|
ClientConnection::UdpAssociate(associate, _) => {
|
|
let mut sock = associate
|
|
.reply(
|
|
Reply::CommandNotSupported,
|
|
Address::unspecified(),
|
|
)
|
|
.await
|
|
.with_kind(ErrorKind::Network)?;
|
|
sock.shutdown()
|
|
.await
|
|
.with_kind(ErrorKind::Network)?;
|
|
}
|
|
}
|
|
|
|
Ok::<_, Error>(())
|
|
}
|
|
.await
|
|
{
|
|
tracing::trace!("SOCKS5 Stream Error: {e}");
|
|
tracing::trace!("{e:?}");
|
|
}
|
|
});
|
|
}
|
|
Err(e) => {
|
|
tracing::error!("SOCKS5 TCP Accept Error: {e}");
|
|
tracing::debug!("{e:?}");
|
|
}
|
|
}
|
|
}
|
|
})
|
|
.await;
|
|
})
|
|
.into(),
|
|
})
|
|
}
|
|
}
|