2020-10-21 18:00:15 +02:00
|
|
|
package tunnel
|
|
|
|
|
|
|
|
import (
|
2020-10-23 17:08:42 +02:00
|
|
|
"context"
|
2020-10-21 18:00:15 +02:00
|
|
|
"io"
|
|
|
|
"net"
|
2020-10-23 17:08:42 +02:00
|
|
|
|
|
|
|
"github.com/pkg/errors"
|
2020-10-23 18:26:50 +02:00
|
|
|
"github.com/xtaci/kcp-go/v5"
|
2020-10-23 17:08:42 +02:00
|
|
|
"gitlab.com/wpetit/goweb/logger"
|
2020-10-21 18:00:15 +02:00
|
|
|
)
|
|
|
|
|
2020-10-23 17:08:42 +02:00
|
|
|
func pipe(ctx context.Context, client net.Conn, server net.Conn) (err error) {
|
2020-10-21 18:00:15 +02:00
|
|
|
stop := make(chan bool)
|
|
|
|
|
2020-10-23 13:42:44 +02:00
|
|
|
go func() {
|
|
|
|
err = relay(client, server, stop)
|
2020-10-23 17:08:42 +02:00
|
|
|
if err != nil {
|
|
|
|
err = errors.WithStack(err)
|
|
|
|
logger.Debug(ctx, "client->server error", logger.E(err))
|
|
|
|
}
|
2020-10-23 13:42:44 +02:00
|
|
|
}()
|
|
|
|
go func() {
|
|
|
|
err = relay(server, client, stop)
|
2020-10-23 17:08:42 +02:00
|
|
|
if err != nil {
|
|
|
|
err = errors.WithStack(err)
|
|
|
|
logger.Debug(ctx, "server->client error", logger.E(err))
|
|
|
|
}
|
2020-10-23 13:42:44 +02:00
|
|
|
}()
|
2020-10-21 18:00:15 +02:00
|
|
|
|
|
|
|
select {
|
|
|
|
case <-stop:
|
2020-10-23 13:42:44 +02:00
|
|
|
return err
|
2020-10-21 18:00:15 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-10-23 17:08:42 +02:00
|
|
|
func relay(src net.Conn, dst net.Conn, stop chan bool) (err error) {
|
2020-10-23 13:42:44 +02:00
|
|
|
_, err = io.Copy(dst, src)
|
2020-10-23 17:08:42 +02:00
|
|
|
if errors.Is(err, io.EOF) {
|
|
|
|
err = nil
|
|
|
|
}
|
2020-10-23 13:42:44 +02:00
|
|
|
|
2020-10-23 17:08:42 +02:00
|
|
|
if err != nil {
|
|
|
|
err = errors.WithStack(err)
|
|
|
|
}
|
2020-10-23 13:42:44 +02:00
|
|
|
|
2020-10-21 18:00:15 +02:00
|
|
|
stop <- true
|
2020-10-23 13:42:44 +02:00
|
|
|
|
2020-10-21 18:00:15 +02:00
|
|
|
return
|
|
|
|
}
|
2020-10-23 18:26:50 +02:00
|
|
|
|
|
|
|
func createBlockCrypt(algorithm string, pass []byte) (kcp.BlockCrypt, error) {
|
|
|
|
switch algorithm {
|
|
|
|
case "sm4":
|
|
|
|
return kcp.NewSM4BlockCrypt(pass[:16])
|
|
|
|
case "tea":
|
|
|
|
return kcp.NewTEABlockCrypt(pass[:16])
|
|
|
|
case "xor":
|
|
|
|
return kcp.NewSimpleXORBlockCrypt(pass)
|
|
|
|
case "none":
|
|
|
|
return kcp.NewNoneBlockCrypt(pass)
|
|
|
|
case "aes-128":
|
|
|
|
return kcp.NewAESBlockCrypt(pass[:16])
|
|
|
|
case "aes-192":
|
|
|
|
return kcp.NewAESBlockCrypt(pass[:24])
|
|
|
|
case "blowfish":
|
|
|
|
return kcp.NewBlowfishBlockCrypt(pass)
|
|
|
|
case "twofish":
|
|
|
|
return kcp.NewTwofishBlockCrypt(pass)
|
|
|
|
case "cast5":
|
|
|
|
return kcp.NewCast5BlockCrypt(pass[:16])
|
|
|
|
case "3des":
|
|
|
|
return kcp.NewTripleDESBlockCrypt(pass[:24])
|
|
|
|
case "xtea":
|
|
|
|
return kcp.NewXTEABlockCrypt(pass[:16])
|
|
|
|
case "salsa20":
|
|
|
|
return kcp.NewSalsa20BlockCrypt(pass)
|
|
|
|
default:
|
|
|
|
return nil, errors.Errorf("unknown algorithm '%s'", algorithm)
|
|
|
|
}
|
|
|
|
}
|