Public Internet facing gateway (TCP reverse tunnel) for greenhouse 🏔️⛰️🛤️⛰️🏔️
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
forest a3362a19df implement maximum reconnect 2 months ago
..
proto working on MultiTenantMode support, removing non-TLS mode 9 months ago
tunneltest move module correctly 2 months ago
LICENSE Making it a Go module and ripping out koding logger -- move files 2 years ago
README.md move module correctly 2 months ago
client.go implement maximum reconnect 2 months ago
clientstate_string.go Making it a Go module and ripping out koding logger -- move files 2 years ago
control.go Making it a Go module and ripping out koding logger -- move files 2 years ago
helper_test.go move module correctly 2 months ago
proxy.go cleaning up and working on implementing threshold test mode 4 months ago
server.go allow users to define tunnels for disconnected nodes 4 months ago
sni.go Virtual Hosts and SNI routing is working 1 year ago
spec.md Making it a Go module and ripping out koding logger -- move files 2 years ago
tcpproxy.go support dialing unix sockets for local servers, support PROXY proto for 4 months ago
tunnel_test.go move module correctly 2 months ago
util.go implement maximum reconnect 2 months ago
virtualaddr.go finish implementing LocalSOCKS5Address and fix a couple bugs 2 months ago
websocket_test.go move module correctly 2 months ago

README.md

Tunnel

Tunnel is a server/client package that enables to proxy public connections to your local machine over a tunnel connection from the local machine to the public server. What this means is, you can share your localhost even if it doesn't have a Public IP or if it's not reachable from outside.

It uses the excellent yamux package to multiplex connections between server and client.

The project is under active development, please vendor it if you want to use it.

Usage

The tunnel package consists of two parts. The server and the client.

Server is the public facing part. It's type that satisfies the http.Handler. So it's easily pluggable into existing servers.

Let assume that you setup your DNS service so all *.example.com domains route to your server at the public IP 203.0.113.0. Let us first create the server part:

package main

import (
	"net/http"

	"git.sequentialread.com/forest/threshold"
)

func main() {
	cfg := &tunnel.ServerConfig{}
	server, _ := tunnel.NewServer(cfg)
	server.AddHost("sub.example.com", "1234")
	http.ListenAndServe(":80", server)
}

Once you create the server, you just plug it into your server. The only detail here is to map a virtualhost to a secret token. The secret token is the only part that needs to be known for the client side.

Let us now create the client side part:

package main

import "git.sequentialread.com/forest/threshold"

func main() {
	cfg := &tunnel.ClientConfig{
		Identifier: "1234",
		ServerAddr: "203.0.113.0:80",
	}

	client, err := tunnel.NewClient(cfg)
	if err != nil {
		panic(err)
	}

	client.Start()
}

The Start() method is by default blocking. As you see you, we just passed the server address and the secret token.

Now whenever someone hit sub.example.com, the request will be proxied to the machine where client is running and hit the local server running 127.0.0.1:80 (assuming there is one). If someone hits sub.example.com:3000 (assume your server is running at this port), it'll be routed to 127.0.0.1:3000

That's it.

There are many options that can be changed, such as a static local address for your client. Have alook at the documentation

Protocol

The server/client protocol is written in the spec.md file. Please have a look for more detail.

License

The BSD 3-Clause License - see LICENSE for more details