Просмотр исходного кода

Added gitignore, dockerfile and updated readme

Michael Goldberger 9 лет назад
Родитель
Сommit
2daaaec807
3 измененных файлов с 83 добавлено и 12 удалено
  1. 4 0
      Server/.gitignore
  2. 22 0
      Server/Dockerfile
  3. 57 12
      Server/README.md

+ 4 - 0
Server/.gitignore

@@ -0,0 +1,4 @@
+Server
+psiphond
+psiphond.config
+serverEntry.dat

+ 22 - 0
Server/Dockerfile

@@ -0,0 +1,22 @@
+FROM alpine:latest
+
+MAINTAINER Psiphon Inc. <info@psiphon.ca>
+LABEL Description="Alpine Linux based Psiphon Tunnel-Core Server" Vendor="Psiphon Inc." Version="1.0"
+
+RUN apk add --update \
+      bash \
+      ca-certificates \
+    && rm -rf /var/cache/apk/*
+
+RUN mkdir -p /opt/psiphon
+
+ADD ["psiphond", "psiphond.config", "/opt/psiphon/"]
+
+EXPOSE 22
+EXPOSE 53
+EXPOSE 443
+EXPOSE 80
+
+WORKDIR /opt/psiphon
+
+ENTRYPOINT ["./psiphond", "--config", "psiphond.config", "run"]

+ 57 - 12
Server/README.md

@@ -1,17 +1,62 @@
-Psiphon Tunnel Core Server README
-================================================================================
+## Psiphon Tunnel Core Server README
 
-Overview
---------------------------------------------------------------------------------
+### Overview
+The `Server`/`psiphond` program and the `github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/server` package contain an experimental Psiphon server stack.
 
-The `Server` program and the `github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/server` package contain an experimental Psiphon server stack.
+Functionality is based on the [production server stack](https://bitbucket.org/psiphon/psiphon-circumvention-system/src/tip/Server/) but only a small subset is implemented. Currently, this stack supports the `SSH` and `OSSH` protocols and has a minimal web server to support the API calls the tunnel-core client requires.
 
-Functionality is based on the (production server stack)[https://bitbucket.org/psiphon/psiphon-circumvention-system/src/tip/Server/] but only a small subset is implemented. Currently, this stack supports the `SSH` protocol and has a minimal web server to support the API calls the tunnel-core client requires.
+### Build
+Prerequisites:
+ - Go 1.6.2 or later
 
-Usage
---------------------------------------------------------------------------------
+Build Steps:
+ - Get dependencies: `go get -d -v ./...`
+ - Build: `go build -o psiphond main.go` (will generate a binary named `psiphond` for Linux/OSX  or `psiphond.exe` for Windows)
 
-* Execute `Server generate` to generate a server configuration, including new key material and credentials. This will emit a config file and a server entry file.
- * Note: `generate` does not yet take input parameters, so for now you must edit code if you must change the server IP address or ports.
-* Execute `Server run` to run the server stack using the generated configuration.
-* Copy the contents of the server entry file to the client (e.g., the `TargetServerEntry` config field in the tunnel-core client) to connect to the server.
+#### MUSL `libc` build (for Alpine Linux on Docker)
+Prerequisites:
+ - Go 1.6.2 or later
+ - Docker 1.10 or later
+ - MUSL libc toolchain
+
+##### Building MUSL
+ 1. Clone the latest source (master is stable): `git clone git://git.musl-libc.org/musl`
+ 2. Change into the musl directory: `cd musl`
+ 3. Configure the build environment: `./configure`
+ 4. Build the libraries and toolchain binaries: `make`
+ 5. Install: `sudo make install`
+    - Installs to `/usr/local/musl` by default, change by passing `--prefix <path>` as a flag to the configure script in step 3
+
+##### Building the binary with MUSL for Docker
+Build Steps:
+ - Get dependencies: `GOOS=linux GOARCH=amd64 go get -d -v ./...`
+ - Build: `GOOS=linux GOARCH=amd64 CC=/usr/local/musl/bin/musl-gcc go build --ldflags '-linkmode external -extldflags "-static"' -o psiphond main.go` (will generate a statically linked binary named `psiphond`)
+
+##### Generate a configuration file
+ 1. Use the command `./psiphond --help` to get a list of flags to pass to the `generate` sub-command
+ 2. Run: `./psiphond --newConfig psiphond.config --protocol SSH:22 --protocol OSSH:53 --web 80 generate`
+ 3. Remove the value for the `SyslogFacility` key (eg: `sed -i 's/"SyslogFacility": "user"/"SyslogFacility": ""/' psiphond.config`)
+ 4. Remove the value for the `Fail2BanFormat` key (eg: `sed -i 's/"Fail2BanFormat": "Authentication failure for psiphon-client from %s"/"Fail2BanFormat": ""/' psiphond.config`)
+
+##### Create the Docker image:
+ 1. Run the command: `docker build --no-cache=true -t psiphond .` (this may take some time to complete)
+    - Subsequent updates can be built without the `--no-cache=true` flag to speed up builds
+ 2. Once completed, verify that you see an image named `psiphond` when running: `docker images`
+
+### Usage
+- Execute `./psiphond generate` to generate a server configuration, including new key material and credentials. This will emit a config file and a server entry file.
+ - Note: `generate` does not yet take input parameters, so for now you must edit code if you must change the server IP address or ports.
+- Execute `./psiphond run` to run the server stack using the generated configuration.
+- Copy the contents of the server entry file to the client (e.g., the `TargetServerEntry` config field in the tunnel-core client) to connect to the server.
+
+#### Run the docker image
+Run the docker container built above as follows: `docker run -d --name psiphond-1 -p 10053:53 -p 10022:22 -p 10080:80 psiphond`
+
+This will start a daemonized container, running the tunnel core server named `psiphond-1`, with `host:container` port mappings:
+ - 10053:53
+ - 10022:22
+ - 10080:80
+
+ The container can be stopped by issuing the command `docker stop psiphond-1`. It will send the server a `SIGTERM`, followed by a `SIGKILL` if it is still running after a grace period
+
+ The container logs can be viewed/tailed/etc via the `docker logs psiphond-1` command and the various flags the `logs` subcommand allows