github.com/psiphon-Labs/psiphon-tunnel-core@v2.0.28+incompatible/Server/main.go (about)

     1  /*
     2   * Copyright (c) 2016, Psiphon Inc.
     3   * All rights reserved.
     4   *
     5   * This program is free software: you can redistribute it and/or modify
     6   * it under the terms of the GNU General Public License as published by
     7   * the Free Software Foundation, either version 3 of the License, or
     8   * (at your option) any later version.
     9   *
    10   * This program is distributed in the hope that it will be useful,
    11   * but WITHOUT ANY WARRANTY; without even the implied warranty of
    12   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
    13   * GNU General Public License for more details.
    14   *
    15   * You should have received a copy of the GNU General Public License
    16   * along with this program.  If not, see <http://www.gnu.org/licenses/>.
    17   *
    18   */
    19  
    20  package main
    21  
    22  import (
    23  	"encoding/json"
    24  	"flag"
    25  	"fmt"
    26  	"io"
    27  	"io/ioutil"
    28  	"os"
    29  	"strconv"
    30  	"strings"
    31  	"syscall"
    32  	"time"
    33  
    34  	"github.com/Psiphon-Inc/rotate-safe-writer"
    35  	"github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common"
    36  	"github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/buildinfo"
    37  	"github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/server"
    38  	"github.com/mitchellh/panicwrap"
    39  )
    40  
    41  var loadedConfigJSON []byte
    42  
    43  func main() {
    44  
    45  	var configFilename string
    46  	var generateServerIPaddress string
    47  	var generateServerNetworkInterface string
    48  	var generateProtocolPorts stringListFlag
    49  	var generateWebServerPort int
    50  	var generateLogFilename string
    51  	var generateTrafficRulesConfigFilename string
    52  	var generateOSLConfigFilename string
    53  	var generateTacticsConfigFilename string
    54  	var generateServerEntryFilename string
    55  
    56  	flag.StringVar(
    57  		&configFilename,
    58  		"config",
    59  		server.SERVER_CONFIG_FILENAME,
    60  		"run or generate with this config `filename`")
    61  
    62  	flag.StringVar(
    63  		&generateServerIPaddress,
    64  		"ipaddress",
    65  		server.DEFAULT_SERVER_IP_ADDRESS,
    66  		"generate with this server `IP address`")
    67  
    68  	flag.StringVar(
    69  		&generateServerNetworkInterface,
    70  		"interface",
    71  		"",
    72  		"generate with server IP address from this `network-interface`")
    73  
    74  	flag.Var(
    75  		&generateProtocolPorts,
    76  		"protocol",
    77  		"generate with `protocol:port`; flag may be repeated to enable multiple protocols")
    78  
    79  	flag.IntVar(
    80  		&generateWebServerPort,
    81  		"web",
    82  		0,
    83  		"generate with web server `port`; 0 for no web server")
    84  
    85  	flag.StringVar(
    86  		&generateLogFilename,
    87  		"logFilename",
    88  		"",
    89  		"set application log file name and path; blank for stderr")
    90  
    91  	flag.StringVar(
    92  		&generateTrafficRulesConfigFilename,
    93  		"trafficRules",
    94  		server.SERVER_TRAFFIC_RULES_CONFIG_FILENAME,
    95  		"generate with this traffic rules config `filename`")
    96  
    97  	flag.StringVar(
    98  		&generateOSLConfigFilename,
    99  		"osl",
   100  		server.SERVER_OSL_CONFIG_FILENAME,
   101  		"generate with this OSL config `filename`")
   102  
   103  	flag.StringVar(
   104  		&generateTacticsConfigFilename,
   105  		"tactics",
   106  		server.SERVER_TACTICS_CONFIG_FILENAME,
   107  		"generate with this tactics config `filename`")
   108  
   109  	flag.StringVar(
   110  		&generateServerEntryFilename,
   111  		"serverEntry",
   112  		server.SERVER_ENTRY_FILENAME,
   113  		"generate with this server entry `filename`")
   114  
   115  	flag.Usage = func() {
   116  		fmt.Fprintf(os.Stderr,
   117  			"Usage:\n\n"+
   118  				"%s <flags> generate    generates configuration files\n"+
   119  				"%s <flags> run         runs configured services\n\n",
   120  			os.Args[0], os.Args[0])
   121  		flag.PrintDefaults()
   122  	}
   123  
   124  	flag.Parse()
   125  
   126  	args := flag.Args()
   127  
   128  	if len(args) < 1 {
   129  		flag.Usage()
   130  		os.Exit(1)
   131  	} else if args[0] == "generate" {
   132  
   133  		serverIPaddress := generateServerIPaddress
   134  
   135  		if generateServerNetworkInterface != "" {
   136  			// TODO: IPv6 support
   137  			serverIPv4Address, _, err := common.GetInterfaceIPAddresses(generateServerNetworkInterface)
   138  			if err == nil && serverIPv4Address == nil {
   139  				err = fmt.Errorf("no IPv4 address for interface %s", generateServerNetworkInterface)
   140  			}
   141  			if err != nil {
   142  				fmt.Printf("generate failed: %s\n", err)
   143  				os.Exit(1)
   144  			}
   145  			serverIPaddress = serverIPv4Address.String()
   146  		}
   147  
   148  		tunnelProtocolPorts := make(map[string]int)
   149  
   150  		for _, protocolPort := range generateProtocolPorts {
   151  			parts := strings.Split(protocolPort, ":")
   152  			if len(parts) == 2 {
   153  				port, err := strconv.Atoi(parts[1])
   154  				if err != nil {
   155  					fmt.Printf("generate failed: %s\n", err)
   156  					os.Exit(1)
   157  				}
   158  				tunnelProtocolPorts[parts[0]] = port
   159  			}
   160  		}
   161  
   162  		configJSON, trafficRulesConfigJSON, OSLConfigJSON,
   163  			tacticsConfigJSON, encodedServerEntry, err :=
   164  			server.GenerateConfig(
   165  				&server.GenerateConfigParams{
   166  					LogFilename:                generateLogFilename,
   167  					ServerIPAddress:            serverIPaddress,
   168  					EnableSSHAPIRequests:       true,
   169  					WebServerPort:              generateWebServerPort,
   170  					TunnelProtocolPorts:        tunnelProtocolPorts,
   171  					TrafficRulesConfigFilename: generateTrafficRulesConfigFilename,
   172  					OSLConfigFilename:          generateOSLConfigFilename,
   173  					TacticsConfigFilename:      generateTacticsConfigFilename,
   174  				})
   175  		if err != nil {
   176  			fmt.Printf("generate failed: %s\n", err)
   177  			os.Exit(1)
   178  		}
   179  
   180  		err = ioutil.WriteFile(configFilename, configJSON, 0600)
   181  		if err != nil {
   182  			fmt.Printf("error writing configuration file: %s\n", err)
   183  			os.Exit(1)
   184  		}
   185  
   186  		err = ioutil.WriteFile(generateTrafficRulesConfigFilename, trafficRulesConfigJSON, 0600)
   187  		if err != nil {
   188  			fmt.Printf("error writing traffic rule config file: %s\n", err)
   189  			os.Exit(1)
   190  		}
   191  
   192  		err = ioutil.WriteFile(generateOSLConfigFilename, OSLConfigJSON, 0600)
   193  		if err != nil {
   194  			fmt.Printf("error writing OSL config file: %s\n", err)
   195  			os.Exit(1)
   196  		}
   197  
   198  		err = ioutil.WriteFile(generateTacticsConfigFilename, tacticsConfigJSON, 0600)
   199  		if err != nil {
   200  			fmt.Printf("error writing tactics config file: %s\n", err)
   201  			os.Exit(1)
   202  		}
   203  
   204  		err = ioutil.WriteFile(generateServerEntryFilename, encodedServerEntry, 0600)
   205  		if err != nil {
   206  			fmt.Printf("error writing server entry file: %s\n", err)
   207  			os.Exit(1)
   208  		}
   209  
   210  	} else if args[0] == "run" {
   211  
   212  		configJSON, err := ioutil.ReadFile(configFilename)
   213  		if err != nil {
   214  			fmt.Printf("error loading configuration file: %s\n", err)
   215  			os.Exit(1)
   216  		}
   217  
   218  		loadedConfigJSON = configJSON
   219  
   220  		// The initial call to panicwrap.Wrap will spawn a child process
   221  		// running the same program.
   222  		//
   223  		// The parent process waits for the child to terminate and
   224  		// panicHandler logs any panics from the child.
   225  		//
   226  		// The child will return immediately from Wrap without spawning
   227  		// and fall through to server.RunServices.
   228  
   229  		// Unhandled panic wrapper. Logs it, then re-executes the current executable
   230  		exitStatus, err := panicwrap.Wrap(&panicwrap.WrapConfig{
   231  			Handler:        panicHandler,
   232  			ForwardSignals: []os.Signal{os.Interrupt, os.Kill, syscall.SIGTERM, syscall.SIGUSR1, syscall.SIGUSR2, syscall.SIGTSTP, syscall.SIGCONT},
   233  		})
   234  		if err != nil {
   235  			fmt.Printf("failed to set up the panic wrapper: %s\n", err)
   236  			os.Exit(1)
   237  		}
   238  
   239  		// Note: panicwrap.Wrap documentation states that exitStatus == -1
   240  		// should be used to determine whether the process is the child.
   241  		// However, we have found that this exitStatus is returned even when
   242  		// the process is the parent. Likely due to panicwrap returning
   243  		// syscall.WaitStatus.ExitStatus() as the exitStatus, which _can_ be
   244  		// -1. Checking panicwrap.Wrapped(nil) is more reliable.
   245  
   246  		if !panicwrap.Wrapped(nil) {
   247  			os.Exit(exitStatus)
   248  		}
   249  		// Else, this is the child process.
   250  
   251  		err = server.RunServices(configJSON)
   252  		if err != nil {
   253  			fmt.Printf("run failed: %s\n", err)
   254  			os.Exit(1)
   255  		}
   256  	}
   257  }
   258  
   259  type stringListFlag []string
   260  
   261  func (list *stringListFlag) String() string {
   262  	return strings.Join(*list, ", ")
   263  }
   264  
   265  func (list *stringListFlag) Set(flagValue string) error {
   266  	*list = append(*list, flagValue)
   267  	return nil
   268  }
   269  
   270  func panicHandler(output string) {
   271  	if len(loadedConfigJSON) > 0 {
   272  		config, err := server.LoadConfig([]byte(loadedConfigJSON))
   273  		if err != nil {
   274  			fmt.Printf("error parsing configuration file: %s\n%s\n", err, output)
   275  			os.Exit(1)
   276  		}
   277  
   278  		logEvent := make(map[string]string)
   279  		logEvent["host_id"] = config.HostID
   280  		logEvent["build_rev"] = buildinfo.GetBuildInfo().BuildRev
   281  		logEvent["timestamp"] = time.Now().Format(time.RFC3339)
   282  		logEvent["event_name"] = "server_panic"
   283  
   284  		// ELK has a maximum field length of 32766 UTF8 bytes. Over that length, the
   285  		// log won't be delivered. Truncate the panic field, as it may be much longer.
   286  		maxLen := 32766
   287  		if len(output) > maxLen {
   288  			output = output[:maxLen]
   289  		}
   290  
   291  		logEvent["panic"] = output
   292  
   293  		// Logs are written to the configured file name. If no name is specified, logs are written to stderr
   294  		var jsonWriter io.Writer
   295  		if config.LogFilename != "" {
   296  
   297  			retries, create, mode := config.GetLogFileReopenConfig()
   298  			panicLog, err := rotate.NewRotatableFileWriter(
   299  				config.LogFilename, retries, create, mode)
   300  			if err != nil {
   301  				fmt.Printf("unable to set panic log output: %s\n%s\n", err, output)
   302  				os.Exit(1)
   303  			}
   304  			defer panicLog.Close()
   305  
   306  			jsonWriter = panicLog
   307  		} else {
   308  			jsonWriter = os.Stderr
   309  		}
   310  
   311  		enc := json.NewEncoder(jsonWriter)
   312  		err = enc.Encode(logEvent)
   313  		if err != nil {
   314  			fmt.Printf("unable to serialize panic message to JSON: %s\n%s\n", err, output)
   315  			os.Exit(1)
   316  		}
   317  	} else {
   318  		fmt.Printf("no configuration JSON was loaded, cannot continue\n%s\n", output)
   319  		os.Exit(1)
   320  	}
   321  
   322  	os.Exit(1)
   323  }