1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
|
use chrono::offset::Local;
use futures_util::future::try_join;
use http::uri::Uri;
use hyper::service::{make_service_fn, service_fn};
use hyper::upgrade::Upgraded;
use hyper::{Body, Client, Method, Request, Response, Server};
use regex::Regex;
use serde::Deserialize;
use serde_dhall::StaticType;
use std::convert::Infallible;
use std::net::SocketAddr;
use structopt::StructOpt;
use tokio::net::TcpStream;
#[macro_use]
extern crate log;
type HttpClient = Client<hyper::client::HttpConnector>;
#[derive(Debug, StructOpt)]
#[structopt()]
struct Opt {
#[structopt(short, long)]
config: String,
#[structopt(short, long, default_value = "127.0.0.1:8200")]
address: SocketAddr,
}
#[derive(Debug, Deserialize, StaticType, Clone)]
struct Access {
times: Vec<Time>,
hosts: Vec<String>,
}
#[derive(Debug, Deserialize, StaticType, Clone)]
struct Time {
days: String,
from: String,
to: String,
}
#[tokio::main]
async fn main() {
env_logger::from_env(env_logger::Env::default().default_filter_or("info")).init();
let opt = Opt::from_args();
match serde_dhall::from_file(opt.config)
.static_type_annotation()
.parse::<Vec<Access>>()
{
Ok(config) => {
let client = HttpClient::new();
let make_service = make_service_fn(move |_| {
let config = config.clone();
let client = client.clone();
async move {
Ok::<_, Infallible>(service_fn(move |req| {
proxy(config.clone(), client.clone(), req)
}))
}
});
let server = Server::bind(&opt.address).serve(make_service);
info!("Listening on http://{}", opt.address);
if let Err(e) = server.await {
error!("server error: {}", e);
}
}
Err(err) => error!("{}", err),
}
}
async fn proxy(
config: Vec<Access>,
client: HttpClient,
req: Request<Body>,
) -> Result<Response<Body>, hyper::Error> {
debug!("req: {:?}", req);
let uri = req.uri();
let unauthorized_hosts = currently_unauthorized_hosts(config);
if block_uri(&unauthorized_hosts, uri) {
debug!("Blocked: {:?}", uri);
Ok(Response::new(Body::empty()))
} else {
debug!("Authorized: {:?}", uri);
if req.method() == Method::CONNECT {
if let Some(addr) = host_addr(uri) {
tokio::task::spawn(async move {
match req.into_body().on_upgrade().await {
Ok(upgraded) => {
if let Err(e) = tunnel(upgraded, &addr).await {
warn!("server io error: {}", e);
};
}
Err(e) => error!("upgrade error: {}", e),
}
});
Ok(Response::new(Body::empty()))
} else {
error!("CONNECT host is not socket addr: {:?}", uri);
let mut resp = Response::new(Body::from("CONNECT must be to a socket address"));
*resp.status_mut() = http::StatusCode::BAD_REQUEST;
Ok(resp)
}
} else {
client.request(req).await
}
}
}
fn host_addr(uri: &http::Uri) -> Option<String> {
uri.authority().map(|auth| auth.as_str().to_string())
}
// Create a TCP connection to host:port, build a tunnel between the connection and
// the upgraded connection
async fn tunnel(upgraded: Upgraded, addr: &str) -> std::io::Result<()> {
// Connect to remote server
let mut server = TcpStream::connect(addr).await?;
// Proxying data
let amounts = {
let (mut server_rd, mut server_wr) = server.split();
let (mut client_rd, mut client_wr) = tokio::io::split(upgraded);
let client_to_server = tokio::io::copy(&mut client_rd, &mut server_wr);
let server_to_client = tokio::io::copy(&mut server_rd, &mut client_wr);
try_join(client_to_server, server_to_client).await
};
match amounts {
Ok((from_client, from_server)) => {
debug!(
"client wrote {} bytes and received {} bytes",
from_client, from_server
);
}
Err(e) => {
debug!("tunnel error: {}", e);
}
};
Ok(())
}
fn block_uri(unauthorized_hosts: &Vec<String>, uri: &Uri) -> bool {
match uri.host() {
Some(h) => unauthorized_hosts
.iter()
.find(|unauthorized_host| h.contains(*unauthorized_host))
.is_some(),
None => false,
}
}
fn currently_unauthorized_hosts(config: Vec<Access>) -> Vec<String> {
let now = Local::now();
// Format spec: https://docs.rs/chrono/0.4.15/chrono/format/strftime/index.html
let day = now.format("%u").to_string().parse::<i32>().unwrap();
let hour = now.format("%H").to_string().parse::<i32>().unwrap();
let minutes = now.format("%M").to_string().parse::<i32>().unwrap();
let now = (hour, minutes);
config
.into_iter()
.map(|access| {
let Access { times, hosts } = access;
times
.into_iter()
.map(|time| {
let days = parse_days(&time.days);
let from = parse_time(&time.from);
let to = parse_time(&time.to);
if days.contains(&day) {
if is_before_or_eq(from, to) {
if is_after_or_eq(now, from) && is_before_or_eq(now, to) {
hosts.clone()
} else {
Vec::new()
}
} else {
if is_after_or_eq(now, from) || is_before_or_eq(now, to) {
hosts.clone()
} else {
Vec::new()
}
}
} else {
Vec::new()
}
})
.collect::<Vec<Vec<String>>>()
.concat()
})
.collect::<Vec<Vec<String>>>()
.concat()
}
fn parse_days(str: &str) -> Vec<i32> {
let xs = str.split("-").collect::<Vec<&str>>();
let from = parse_day(xs[0]);
let to = parse_day(xs[1]);
(1..8)
.filter(|d| {
if from < to {
d >= &from && d <= &to
} else {
d >= &from || d <= &to
}
})
.collect()
}
fn parse_day(str: &str) -> i32 {
match str {
"Monday" => 1,
"Tuesday" => 2,
"Wednesday" => 3,
"Thursday" => 4,
"Friday" => 5,
"Saturday" => 6,
_ => 7,
}
}
fn parse_time(str: &str) -> (i32, i32) {
let regex = Regex::new(r"(\d{2}):(\d{2})").unwrap();
match regex.captures(str) {
Some(cap) => (cap[1].parse().unwrap(), cap[2].parse().unwrap()),
None => panic!("Error while parsing time: {}", str),
}
}
fn is_before_or_eq(t1: (i32, i32), t2: (i32, i32)) -> bool {
t1.0 < t2.0 || t1.0 == t2.0 && t1.1 <= t2.1
}
fn is_after_or_eq(t1: (i32, i32), t2: (i32, i32)) -> bool {
is_before_or_eq(t2, t1)
}
|