forked from elliotchance/sshtunnel
-
Notifications
You must be signed in to change notification settings - Fork 1
/
ssh_tunnel.go
133 lines (108 loc) Β· 2.61 KB
/
ssh_tunnel.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
package sshtunnel
import (
"golang.org/x/crypto/ssh"
"io"
"log"
"net"
"strconv"
)
type SSHTunnel struct {
Local *Endpoint
Server *Endpoint
Remote *Endpoint
Config *ssh.ClientConfig
Log *log.Logger
}
func (tunnel *SSHTunnel) logf(fmt string, args ...interface{}) {
if tunnel.Log != nil {
tunnel.Log.Printf(fmt, args...)
}
}
func (tunnel *SSHTunnel) Start() error {
listener, err := net.Listen("tcp", tunnel.Local.String())
if err != nil {
return err
}
defer listener.Close()
tunnel.Local.Port = listener.Addr().(*net.TCPAddr).Port
for {
conn, err := listener.Accept()
if err != nil {
return err
}
tunnel.logf("accepted connection")
go tunnel.forward(conn)
}
}
func (tunnel *SSHTunnel) forward(localConn net.Conn) {
var serverConn *ssh.Client
var serverErr interface{}
var retry int
for {
retry ++
serverConn, serverErr = ssh.Dial("tcp", tunnel.Server.String(), tunnel.Config)
if serverErr != nil {
tunnel.logf("server dial error: %s", serverErr)
} else {
break
}
}
if retry > 1 {
tunnel.logf("Retry server: %s", strconv.Itoa(retry))
}
tunnel.logf("connected to %s (1 of 2)\n", tunnel.Server.String())
var remoteConn net.Conn
var remoteError interface{}
retry = 0
for {
retry ++
remoteConn, remoteError = serverConn.Dial("tcp", tunnel.Remote.String())
if remoteError != nil {
tunnel.logf("remote dial error: %s", remoteError)
}else{
break
}
}
if retry > 1 {
tunnel.logf("Retry remote: %s", strconv.Itoa(retry))
}
tunnel.logf("connected to %s (2 of 2)\n", tunnel.Remote.String())
go func(writer, reader net.Conn) {
defer writer.Close()
defer reader.Close()
_, err := io.Copy(writer, reader)
if err != nil {
tunnel.logf("io.Copy local to remote warm: %s", err)
}
}(localConn, remoteConn)
go func(writer, reader net.Conn) {
defer writer.Close()
defer reader.Close()
_, err := io.Copy(writer, reader)
if err != nil {
tunnel.logf("io.Copy remote to local warm: %s", err)
}
}(remoteConn, localConn)
}
func NewSSHTunnel(tunnel string, auth ssh.AuthMethod, destination string, localPort string) *SSHTunnel {
// A random port will be chosen for us.
localEndpoint := NewEndpoint("localhost:" + localPort)
server := NewEndpoint(tunnel)
if server.Port == 0 {
server.Port = 22
}
sshTunnel := &SSHTunnel{
Config: &ssh.ClientConfig{
User: server.User,
Auth: []ssh.AuthMethod{auth},
HostKeyCallback: func(hostname string, remote net.Addr, key ssh.PublicKey) error {
// Always accept key.
return nil
},
},
Local: localEndpoint,
Server: server,
Remote: NewEndpoint(destination),
}
return sshTunnel
}