mirror of
https://github.com/netbirdio/netbird.git
synced 2026-04-16 15:26:40 +00:00
228 lines
6.0 KiB
Go
228 lines
6.0 KiB
Go
package server
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"io"
|
|
"net"
|
|
"net/http"
|
|
"net/netip"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/coder/websocket"
|
|
log "github.com/sirupsen/logrus"
|
|
|
|
"github.com/netbirdio/netbird/util/wsproxy"
|
|
)
|
|
|
|
const (
|
|
dialTimeout = 10 * time.Second
|
|
bufferSize = 32 * 1024
|
|
)
|
|
|
|
// Config contains the configuration for the WebSocket proxy.
|
|
type Config struct {
|
|
LocalGRPCAddr netip.AddrPort
|
|
Path string
|
|
MetricsRecorder MetricsRecorder
|
|
}
|
|
|
|
// Proxy handles WebSocket to TCP proxying for gRPC connections.
|
|
type Proxy struct {
|
|
config Config
|
|
metrics MetricsRecorder
|
|
}
|
|
|
|
// New creates a new WebSocket proxy instance with optional configuration
|
|
func New(localGRPCAddr netip.AddrPort, opts ...Option) *Proxy {
|
|
config := Config{
|
|
LocalGRPCAddr: localGRPCAddr,
|
|
Path: wsproxy.ProxyPath,
|
|
MetricsRecorder: NoOpMetricsRecorder{}, // Default to no-op
|
|
}
|
|
|
|
for _, opt := range opts {
|
|
opt(&config)
|
|
}
|
|
|
|
return &Proxy{
|
|
config: config,
|
|
metrics: config.MetricsRecorder,
|
|
}
|
|
}
|
|
|
|
// Handler returns an http.Handler that proxies WebSocket connections to the local gRPC server.
|
|
func (p *Proxy) Handler() http.Handler {
|
|
return http.HandlerFunc(p.handleWebSocket)
|
|
}
|
|
|
|
func (p *Proxy) handleWebSocket(w http.ResponseWriter, r *http.Request) {
|
|
ctx := r.Context()
|
|
|
|
p.metrics.RecordConnection(ctx)
|
|
defer p.metrics.RecordDisconnection(ctx)
|
|
|
|
log.Debugf("WebSocket proxy handling connection from %s, forwarding to %s", r.RemoteAddr, p.config.LocalGRPCAddr)
|
|
acceptOptions := &websocket.AcceptOptions{
|
|
OriginPatterns: []string{"*"},
|
|
}
|
|
|
|
wsConn, err := websocket.Accept(w, r, acceptOptions)
|
|
if err != nil {
|
|
p.metrics.RecordError(ctx, "websocket_accept_failed")
|
|
log.Errorf("WebSocket upgrade failed from %s: %v", r.RemoteAddr, err)
|
|
return
|
|
}
|
|
defer func() {
|
|
if err := wsConn.Close(websocket.StatusNormalClosure, ""); err != nil {
|
|
log.Debugf("Failed to close WebSocket: %v", err)
|
|
}
|
|
}()
|
|
|
|
log.Debugf("WebSocket proxy attempting to connect to local gRPC at %s", p.config.LocalGRPCAddr)
|
|
tcpConn, err := net.DialTimeout("tcp", p.config.LocalGRPCAddr.String(), dialTimeout)
|
|
if err != nil {
|
|
p.metrics.RecordError(ctx, "tcp_dial_failed")
|
|
log.Warnf("Failed to connect to local gRPC server at %s: %v", p.config.LocalGRPCAddr, err)
|
|
if err := wsConn.Close(websocket.StatusInternalError, "Backend unavailable"); err != nil {
|
|
log.Debugf("Failed to close WebSocket after connection failure: %v", err)
|
|
}
|
|
return
|
|
}
|
|
defer func() {
|
|
if err := tcpConn.Close(); err != nil {
|
|
log.Debugf("Failed to close TCP connection: %v", err)
|
|
}
|
|
}()
|
|
|
|
log.Debugf("WebSocket proxy established: client %s -> local gRPC %s", r.RemoteAddr, p.config.LocalGRPCAddr)
|
|
|
|
p.proxyData(ctx, wsConn, tcpConn)
|
|
}
|
|
|
|
func (p *Proxy) proxyData(ctx context.Context, wsConn *websocket.Conn, tcpConn net.Conn) {
|
|
proxyCtx, cancel := context.WithCancel(ctx)
|
|
defer cancel()
|
|
|
|
var wg sync.WaitGroup
|
|
wg.Add(2)
|
|
|
|
go p.wsToTCP(proxyCtx, cancel, &wg, wsConn, tcpConn)
|
|
go p.tcpToWS(proxyCtx, cancel, &wg, wsConn, tcpConn)
|
|
|
|
done := make(chan struct{})
|
|
go func() {
|
|
wg.Wait()
|
|
close(done)
|
|
}()
|
|
|
|
select {
|
|
case <-done:
|
|
log.Tracef("Proxy data transfer completed, both goroutines terminated")
|
|
case <-proxyCtx.Done():
|
|
log.Tracef("Proxy data transfer cancelled, forcing connection closure")
|
|
|
|
if err := wsConn.Close(websocket.StatusGoingAway, "proxy cancelled"); err != nil {
|
|
log.Tracef("Error closing WebSocket during cancellation: %v", err)
|
|
}
|
|
if err := tcpConn.Close(); err != nil {
|
|
log.Tracef("Error closing TCP connection during cancellation: %v", err)
|
|
}
|
|
|
|
select {
|
|
case <-done:
|
|
log.Tracef("Goroutines terminated after forced connection closure")
|
|
case <-time.After(2 * time.Second):
|
|
log.Tracef("Goroutines did not terminate within timeout after connection closure")
|
|
}
|
|
}
|
|
}
|
|
|
|
func (p *Proxy) wsToTCP(ctx context.Context, cancel context.CancelFunc, wg *sync.WaitGroup, wsConn *websocket.Conn, tcpConn net.Conn) {
|
|
defer wg.Done()
|
|
defer cancel()
|
|
|
|
for {
|
|
msgType, data, err := wsConn.Read(ctx)
|
|
if err != nil {
|
|
switch {
|
|
case ctx.Err() != nil:
|
|
log.Debugf("wsToTCP goroutine terminating due to context cancellation")
|
|
case websocket.CloseStatus(err) == websocket.StatusNormalClosure:
|
|
log.Debugf("WebSocket closed normally")
|
|
default:
|
|
p.metrics.RecordError(ctx, "websocket_read_error")
|
|
log.Errorf("WebSocket read error: %v", err)
|
|
}
|
|
return
|
|
}
|
|
|
|
if msgType != websocket.MessageBinary {
|
|
log.Warnf("Unexpected WebSocket message type: %v", msgType)
|
|
continue
|
|
}
|
|
|
|
if ctx.Err() != nil {
|
|
log.Tracef("wsToTCP goroutine terminating due to context cancellation before TCP write")
|
|
return
|
|
}
|
|
|
|
if err := tcpConn.SetWriteDeadline(time.Now().Add(5 * time.Second)); err != nil {
|
|
log.Debugf("Failed to set TCP write deadline: %v", err)
|
|
}
|
|
|
|
n, err := tcpConn.Write(data)
|
|
if err != nil {
|
|
p.metrics.RecordError(ctx, "tcp_write_error")
|
|
log.Errorf("TCP write error: %v", err)
|
|
return
|
|
}
|
|
|
|
p.metrics.RecordBytesTransferred(ctx, "ws_to_tcp", int64(n))
|
|
}
|
|
}
|
|
|
|
func (p *Proxy) tcpToWS(ctx context.Context, cancel context.CancelFunc, wg *sync.WaitGroup, wsConn *websocket.Conn, tcpConn net.Conn) {
|
|
defer wg.Done()
|
|
defer cancel()
|
|
|
|
buf := make([]byte, bufferSize)
|
|
for {
|
|
if err := tcpConn.SetReadDeadline(time.Now().Add(5 * time.Second)); err != nil {
|
|
log.Debugf("Failed to set TCP read deadline: %v", err)
|
|
}
|
|
n, err := tcpConn.Read(buf)
|
|
|
|
if err != nil {
|
|
if ctx.Err() != nil {
|
|
log.Tracef("tcpToWS goroutine terminating due to context cancellation")
|
|
return
|
|
}
|
|
|
|
var netErr net.Error
|
|
if errors.As(err, &netErr) && netErr.Timeout() {
|
|
continue
|
|
}
|
|
|
|
if err != io.EOF {
|
|
log.Errorf("TCP read error: %v", err)
|
|
}
|
|
return
|
|
}
|
|
|
|
if ctx.Err() != nil {
|
|
log.Tracef("tcpToWS goroutine terminating due to context cancellation before WebSocket write")
|
|
return
|
|
}
|
|
|
|
if err := wsConn.Write(ctx, websocket.MessageBinary, buf[:n]); err != nil {
|
|
p.metrics.RecordError(ctx, "websocket_write_error")
|
|
log.Errorf("WebSocket write error: %v", err)
|
|
return
|
|
}
|
|
|
|
p.metrics.RecordBytesTransferred(ctx, "tcp_to_ws", int64(n))
|
|
}
|
|
}
|