| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323 |
- /*
- * Copyright (c) 2016, Psiphon Inc.
- * All rights reserved.
- *
- * This program is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see <http://www.gnu.org/licenses/>.
- *
- */
- package main
- import (
- "encoding/json"
- "flag"
- "fmt"
- "io"
- "io/ioutil"
- "os"
- "strconv"
- "strings"
- "syscall"
- "time"
- "github.com/Psiphon-Inc/rotate-safe-writer"
- "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common"
- "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/buildinfo"
- "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/server"
- "github.com/mitchellh/panicwrap"
- )
- var loadedConfigJSON []byte
- func main() {
- var configFilename string
- var generateServerIPaddress string
- var generateServerNetworkInterface string
- var generateProtocolPorts stringListFlag
- var generateWebServerPort int
- var generateLogFilename string
- var generateTrafficRulesConfigFilename string
- var generateOSLConfigFilename string
- var generateTacticsConfigFilename string
- var generateServerEntryFilename string
- flag.StringVar(
- &configFilename,
- "config",
- server.SERVER_CONFIG_FILENAME,
- "run or generate with this config `filename`")
- flag.StringVar(
- &generateServerIPaddress,
- "ipaddress",
- server.DEFAULT_SERVER_IP_ADDRESS,
- "generate with this server `IP address`")
- flag.StringVar(
- &generateServerNetworkInterface,
- "interface",
- "",
- "generate with server IP address from this `network-interface`")
- flag.Var(
- &generateProtocolPorts,
- "protocol",
- "generate with `protocol:port`; flag may be repeated to enable multiple protocols")
- flag.IntVar(
- &generateWebServerPort,
- "web",
- 0,
- "generate with web server `port`; 0 for no web server")
- flag.StringVar(
- &generateLogFilename,
- "logFilename",
- "",
- "set application log file name and path; blank for stderr")
- flag.StringVar(
- &generateTrafficRulesConfigFilename,
- "trafficRules",
- server.SERVER_TRAFFIC_RULES_CONFIG_FILENAME,
- "generate with this traffic rules config `filename`")
- flag.StringVar(
- &generateOSLConfigFilename,
- "osl",
- server.SERVER_OSL_CONFIG_FILENAME,
- "generate with this OSL config `filename`")
- flag.StringVar(
- &generateTacticsConfigFilename,
- "tactics",
- server.SERVER_TACTICS_CONFIG_FILENAME,
- "generate with this tactics config `filename`")
- flag.StringVar(
- &generateServerEntryFilename,
- "serverEntry",
- server.SERVER_ENTRY_FILENAME,
- "generate with this server entry `filename`")
- flag.Usage = func() {
- fmt.Fprintf(os.Stderr,
- "Usage:\n\n"+
- "%s <flags> generate generates configuration files\n"+
- "%s <flags> run runs configured services\n\n",
- os.Args[0], os.Args[0])
- flag.PrintDefaults()
- }
- flag.Parse()
- args := flag.Args()
- if len(args) < 1 {
- flag.Usage()
- os.Exit(1)
- } else if args[0] == "generate" {
- serverIPaddress := generateServerIPaddress
- if generateServerNetworkInterface != "" {
- // TODO: IPv6 support
- serverIPv4Address, _, err := common.GetInterfaceIPAddresses(generateServerNetworkInterface)
- if err == nil && serverIPv4Address == nil {
- err = fmt.Errorf("no IPv4 address for interface %s", generateServerNetworkInterface)
- }
- if err != nil {
- fmt.Printf("generate failed: %s\n", err)
- os.Exit(1)
- }
- serverIPaddress = serverIPv4Address.String()
- }
- tunnelProtocolPorts := make(map[string]int)
- for _, protocolPort := range generateProtocolPorts {
- parts := strings.Split(protocolPort, ":")
- if len(parts) == 2 {
- port, err := strconv.Atoi(parts[1])
- if err != nil {
- fmt.Printf("generate failed: %s\n", err)
- os.Exit(1)
- }
- tunnelProtocolPorts[parts[0]] = port
- }
- }
- configJSON, trafficRulesConfigJSON, OSLConfigJSON,
- tacticsConfigJSON, encodedServerEntry, err :=
- server.GenerateConfig(
- &server.GenerateConfigParams{
- LogFilename: generateLogFilename,
- ServerIPAddress: serverIPaddress,
- EnableSSHAPIRequests: true,
- WebServerPort: generateWebServerPort,
- TunnelProtocolPorts: tunnelProtocolPorts,
- TrafficRulesConfigFilename: generateTrafficRulesConfigFilename,
- OSLConfigFilename: generateOSLConfigFilename,
- TacticsConfigFilename: generateTacticsConfigFilename,
- })
- if err != nil {
- fmt.Printf("generate failed: %s\n", err)
- os.Exit(1)
- }
- err = ioutil.WriteFile(configFilename, configJSON, 0600)
- if err != nil {
- fmt.Printf("error writing configuration file: %s\n", err)
- os.Exit(1)
- }
- err = ioutil.WriteFile(generateTrafficRulesConfigFilename, trafficRulesConfigJSON, 0600)
- if err != nil {
- fmt.Printf("error writing traffic rule config file: %s\n", err)
- os.Exit(1)
- }
- err = ioutil.WriteFile(generateOSLConfigFilename, OSLConfigJSON, 0600)
- if err != nil {
- fmt.Printf("error writing OSL config file: %s\n", err)
- os.Exit(1)
- }
- err = ioutil.WriteFile(generateTacticsConfigFilename, tacticsConfigJSON, 0600)
- if err != nil {
- fmt.Printf("error writing tactics config file: %s\n", err)
- os.Exit(1)
- }
- err = ioutil.WriteFile(generateServerEntryFilename, encodedServerEntry, 0600)
- if err != nil {
- fmt.Printf("error writing server entry file: %s\n", err)
- os.Exit(1)
- }
- } else if args[0] == "run" {
- configJSON, err := ioutil.ReadFile(configFilename)
- if err != nil {
- fmt.Printf("error loading configuration file: %s\n", err)
- os.Exit(1)
- }
- loadedConfigJSON = configJSON
- // The initial call to panicwrap.Wrap will spawn a child process
- // running the same program.
- //
- // The parent process waits for the child to terminate and
- // panicHandler logs any panics from the child.
- //
- // The child will return immediately from Wrap without spawning
- // and fall through to server.RunServices.
- // Unhandled panic wrapper. Logs it, then re-executes the current executable
- exitStatus, err := panicwrap.Wrap(&panicwrap.WrapConfig{
- Handler: panicHandler,
- ForwardSignals: []os.Signal{os.Interrupt, os.Kill, syscall.SIGTERM, syscall.SIGUSR1, syscall.SIGUSR2, syscall.SIGTSTP, syscall.SIGCONT},
- })
- if err != nil {
- fmt.Printf("failed to set up the panic wrapper: %s\n", err)
- os.Exit(1)
- }
- // Note: panicwrap.Wrap documentation states that exitStatus == -1
- // should be used to determine whether the process is the child.
- // However, we have found that this exitStatus is returned even when
- // the process is the parent. Likely due to panicwrap returning
- // syscall.WaitStatus.ExitStatus() as the exitStatus, which _can_ be
- // -1. Checking panicwrap.Wrapped(nil) is more reliable.
- if !panicwrap.Wrapped(nil) {
- os.Exit(exitStatus)
- }
- // Else, this is the child process.
- err = server.RunServices(configJSON)
- if err != nil {
- fmt.Printf("run failed: %s\n", err)
- os.Exit(1)
- }
- }
- }
- type stringListFlag []string
- func (list *stringListFlag) String() string {
- return strings.Join(*list, ", ")
- }
- func (list *stringListFlag) Set(flagValue string) error {
- *list = append(*list, flagValue)
- return nil
- }
- func panicHandler(output string) {
- if len(loadedConfigJSON) > 0 {
- config, err := server.LoadConfig([]byte(loadedConfigJSON))
- if err != nil {
- fmt.Printf("error parsing configuration file: %s\n%s\n", err, output)
- os.Exit(1)
- }
- logEvent := make(map[string]string)
- logEvent["host_id"] = config.HostID
- logEvent["build_rev"] = buildinfo.GetBuildInfo().BuildRev
- logEvent["timestamp"] = time.Now().Format(time.RFC3339)
- logEvent["event_name"] = "server_panic"
- // ELK has a maximum field length of 32766 UTF8 bytes. Over that length, the
- // log won't be delivered. Truncate the panic field, as it may be much longer.
- maxLen := 32766
- if len(output) > maxLen {
- output = output[:maxLen]
- }
- logEvent["panic"] = output
- // Logs are written to the configured file name. If no name is specified, logs are written to stderr
- var jsonWriter io.Writer
- if config.LogFilename != "" {
- retries, create, mode := config.GetLogFileReopenConfig()
- panicLog, err := rotate.NewRotatableFileWriter(
- config.LogFilename, retries, create, mode)
- if err != nil {
- fmt.Printf("unable to set panic log output: %s\n%s\n", err, output)
- os.Exit(1)
- }
- defer panicLog.Close()
- jsonWriter = panicLog
- } else {
- jsonWriter = os.Stderr
- }
- enc := json.NewEncoder(jsonWriter)
- err = enc.Encode(logEvent)
- if err != nil {
- fmt.Printf("unable to serialize panic message to JSON: %s\n%s\n", err, output)
- os.Exit(1)
- }
- } else {
- fmt.Printf("no configuration JSON was loaded, cannot continue\n%s\n", output)
- os.Exit(1)
- }
- os.Exit(1)
- }
|