Skip to content

Commit

Permalink
Merge pull request #106 from ngrok/josh/proxy-url-support
Browse files Browse the repository at this point in the history
ngrok: support connecting through either http or socks5 proxies
  • Loading branch information
jrobsonchase authored Aug 24, 2023
2 parents 54da23c + 2479ce3 commit fc54e72
Show file tree
Hide file tree
Showing 2 changed files with 115 additions and 10 deletions.
10 changes: 6 additions & 4 deletions ngrok/Cargo.toml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
[package]
name = "ngrok"
version = "0.14.0-pre.1"
version = "0.14.0-pre.2"
edition = "2021"
license = "MIT OR Apache-2.0"
description = "The ngrok agent SDK"
Expand All @@ -17,7 +17,7 @@ tracing = "0.1.37"
async-rustls = { version = "0.3.0" }
tokio-util = { version = "0.7.4", features = ["compat"] }
futures = "0.3.25"
hyper = { version = "0.14.23", features = ["server"], optional = true }
hyper = { version = "0.14.23" }
axum = { version = "0.6.1", features = ["tokio"], optional = true }
rustls-pemfile = "1.0.1"
async-trait = "0.1.59"
Expand All @@ -29,7 +29,9 @@ parking_lot = "0.12.1"
once_cell = "1.17.1"
hostname = "0.3.1"
regex = "1.7.3"
http = "0.2.9"
tokio-socks = "0.5.1"
hyper-proxy = "0.9.1"
url = "2.4.0"

[target.'cfg(windows)'.dependencies]
windows-sys = { version = "0.45.0", features = ["Win32_Foundation"] }
Expand Down Expand Up @@ -63,7 +65,7 @@ required-features = ["hyper"]

[features]
default = []
hyper = ["dep:hyper"]
hyper = ["hyper/server", "hyper/http1"]
axum = ["dep:axum", "hyper"]
online-tests = ["axum", "hyper"]
long-tests = ["online-tests"]
Expand Down
115 changes: 109 additions & 6 deletions ngrok/src/session.rs
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,15 @@ use futures::{
prelude::*,
FutureExt,
};
use http::Uri;
use hyper::{
client::HttpConnector,
service::Service,
};
use hyper_proxy::{
Intercept,
Proxy,
ProxyConnector,
};
use muxado::heartbeat::HeartbeatConfig;
pub use muxado::heartbeat::HeartbeatHandler;
use once_cell::sync::OnceCell;
Expand Down Expand Up @@ -59,6 +67,7 @@ use tracing::{
debug,
warn,
};
use url::Url;

pub use crate::internals::{
proto::{
Expand Down Expand Up @@ -217,6 +226,85 @@ pub async fn default_connect(
Ok(Box::new(tls_conn.compat()) as Box<dyn IoStream>)
}

#[derive(Debug, Clone, Error)]
#[error("unsupported proxy address: {0}")]
/// An unsupported proxy address was provided.
pub struct ProxyUnsupportedError(Url);

fn connect_proxy(url: Url) -> Result<Arc<dyn Connector>, ProxyUnsupportedError> {
Ok(match url.scheme() {
"http" | "https" => Arc::new(connect_http_proxy(url)),
"socks5" => {
let host = url.host_str().unwrap_or_default();
let port = url.port().unwrap_or(1080);
Arc::new(connect_socks_proxy(format!("{host}:{port}")))
}
_ => return Err(ProxyUnsupportedError(url)),
})
}

fn connect_http_proxy(url: Url) -> impl Connector {
move |host: String, port, tls_config, _| {
let mut proxy = Proxy::new(
Intercept::All,
url.as_str().try_into().expect("urls should be valid uris"),
);
proxy.force_connect();
let connector = HttpConnector::new();
async move {
let mut connector = ProxyConnector::from_proxy(connector, proxy)
.map_err(|e| ConnectError::ProxyConnect(Box::new(e)))?;

let server_uri = format!("http://{host}:{port}")
.parse()
.expect("host should have been validated by SessionBuilder::server_addr");

let conn = connector
.call(server_uri)
.await
.map_err(|e| ConnectError::ProxyConnect(Box::new(e)))?
.compat();

let tls_conn = async_rustls::TlsConnector::from(tls_config)
.connect(
rustls::ServerName::try_from(host.as_str())
.expect("host should have been validated by SessionBuilder::server_addr"),
conn,
)
.await
.map_err(ConnectError::Tls)?;

Ok(Box::new(tls_conn.compat()) as Box<dyn IoStream>)
}
}
}

fn connect_socks_proxy(proxy_addr: String) -> impl Connector {
move |server_host: String, server_port, tls_config, _| {
let proxy_addr = proxy_addr.clone();
async move {
let conn = tokio_socks::tcp::Socks5Stream::connect(
proxy_addr.as_str(),
format!("{server_host}:{server_port}"),
)
.await
.map_err(|e| ConnectError::ProxyConnect(Box::new(e)))?
.compat();

let tls_conn = async_rustls::TlsConnector::from(tls_config)
.connect(
rustls::ServerName::try_from(server_host.as_str())
.expect("host should have been validated by SessionBuilder::server_addr"),
conn,
)
.await
.map_err(ConnectError::Tls)?;

Ok(Box::new(tls_conn.compat()) as Box<dyn IoStream>)
}
}
}

/// The builder for an ngrok [Session].
#[derive(Clone)]
pub struct SessionBuilder {
Expand Down Expand Up @@ -245,13 +333,13 @@ pub enum ConnectError {
/// An error occurred when establishing a TCP connection to the ngrok
/// server.
#[error("failed to establish tcp connection")]
Tcp(io::Error),
Tcp(#[source] io::Error),
/// A TLS handshake error occurred.
///
/// This is usually a certificate validation issue, or an attempt to connect
/// to something that doesn't actually speak TLS.
#[error("tls handshake error")]
Tls(io::Error),
Tls(#[source] io::Error),
/// An error occurred when starting the ngrok session.
///
/// This might occur when there's a protocol mismatch interfering with the
Expand All @@ -264,6 +352,9 @@ pub enum ConnectError {
/// An error occurred when rebinding tunnels during a reconnect
#[error("error rebinding tunnel after reconnect")]
Rebind(#[source] RpcError),
/// An error arising from a failure to connect through a proxy.
#[error("failed to connect through proxy")]
ProxyConnect(#[source] Box<dyn std::error::Error + Send + Sync + 'static>),
/// The (re)connect function gave up.
///
/// This will never be returned by the default connect function, and is
Expand Down Expand Up @@ -414,19 +505,19 @@ impl SessionBuilder {
/// [server_addr parameter in the ngrok docs]: https://ngrok.com/docs/ngrok-agent/config#server_addr
pub fn server_addr(&mut self, addr: impl Into<String>) -> Result<&mut Self, InvalidServerAddr> {
let addr = addr.into();
let server_uri: Uri = format!("http://{addr}")
let server_uri: Url = format!("http://{addr}")
.parse()
.map_err(|_| InvalidServerAddr(addr.clone()))?;

self.server_host = server_uri
.host()
.host_str()
.map(String::from)
.ok_or_else(|| InvalidServerAddr(addr.clone()))?;

rustls::ServerName::try_from(self.server_host.as_str())
.map_err(|_| InvalidServerAddr(addr.clone()))?;

self.server_port = server_uri.port_u16().unwrap_or(443);
self.server_port = server_uri.port().unwrap_or(443);

Ok(self)
}
Expand Down Expand Up @@ -466,6 +557,18 @@ impl SessionBuilder {
self
}

/// Configures the session to connect to ngrok through an outbound
/// HTTP or SOCKS5 proxy. This parameter is ignored if you override the connector
/// with [SessionBuilder::connector].
///
/// See the [proxy url parameter in the ngrok docs] for additional details.
///
/// [proxy url parameter in the ngrok docs]: https://ngrok.com/docs/ngrok-agent/config#proxy_url
pub fn proxy_url(&mut self, url: Url) -> Result<&mut Self, ProxyUnsupportedError> {
self.connector = connect_proxy(url)?;
Ok(self)
}

/// Configures a function which is called when the ngrok service requests that
/// this [Session] stops. Your application may choose to interpret this callback
/// as a request to terminate the [Session] or the entire process.
Expand Down

0 comments on commit fc54e72

Please sign in to comment.