2016-09-30 17:47:43 +00:00
#!/usr/bin/env node
2016-09-30 16:33:38 +00:00
( function ( ) {
'use strict' ;
var pkg = require ( '../package.json' ) ;
var program = require ( 'commander' ) ;
2016-09-30 19:04:27 +00:00
var url = require ( 'url' ) ;
2016-09-30 16:33:38 +00:00
var stunnel = require ( '../wsclient.js' ) ;
function collectProxies ( val , memo ) {
var vals = val . split ( /,/g ) ;
vals . map ( function ( location ) {
// http:john.example.com:3000
// http://john.example.com:3000
var parts = location . split ( ':' ) ;
parts [ 0 ] = parts [ 0 ] . toLowerCase ( ) ;
parts [ 1 ] = parts [ 1 ] . toLowerCase ( ) . replace ( /(\/\/)?/ , '' ) || '*' ;
parts [ 2 ] = parseInt ( parts [ 2 ] , 10 ) || 0 ;
if ( ! parts [ 2 ] ) {
// TODO grab OS list of standard ports?
if ( 'http' === parts [ 0 ] ) {
parts [ 2 ] = 80 ;
}
else if ( 'https' === parts [ 0 ] ) {
parts [ 2 ] = 443 ;
}
else {
throw new Error ( "port must be specified - ex: tls:*:1337" ) ;
}
}
return {
protocol : parts [ 0 ]
, hostname : parts [ 1 ]
, port : parts [ 2 ]
} ;
2016-09-30 19:04:27 +00:00
} ) . forEach ( function ( val ) {
memo . push ( val ) ;
} ) ;
2016-09-30 16:33:38 +00:00
return memo ;
}
program
. version ( pkg . version )
//.command('jsurl <url>')
. arguments ( '<url>' )
. action ( function ( url ) {
program . url = url ;
} )
2016-09-30 19:04:27 +00:00
. option ( '-k --insecure' , 'Allow TLS connections to stunneld without valid certs (rejectUnauthorized: false)' )
2016-09-30 16:33:38 +00:00
. option ( '--locals <LINE>' , 'comma separated list of <proto>:<//><servername>:<port> to which matching incoming http and https should forward (reverse proxy). Ex: https://john.example.com,tls:*:1337' , collectProxies , [ ] ) // --reverse-proxies
. option ( '--stunneld <URL>' , 'the domain (or ip address) at which you are running stunneld.js (the proxy)' ) // --proxy
2016-09-30 19:04:27 +00:00
. option ( '--secret <STRING>' , 'the same secret used by stunneld (used for JWT authentication)' )
. option ( '--token <STRING>' , 'a pre-generated token for use with stunneld (instead of generating one with --secret)' )
2016-09-30 16:33:38 +00:00
. parse ( process . argv )
;
2016-09-30 19:04:27 +00:00
program . stunneld = program . stunneld || 'wss://pokemap.hellabit.com:3000' ;
2016-09-30 16:33:38 +00:00
var jwt = require ( 'jsonwebtoken' ) ;
2016-09-30 19:04:27 +00:00
var domainsMap = { } ;
var tokenData = {
name : null
, domains : null
} ;
var location = url . parse ( program . stunneld ) ;
if ( ! location . protocol || /\./ . test ( location . protocol ) ) {
program . stunneld = 'wss://' + program . stunneld ;
location = url . parse ( program . stunneld ) ;
}
program . stunneld = location . protocol + '//' + location . hostname + ( location . port ? ':' + location . port : '' ) ;
program . locals . forEach ( function ( proxy ) {
domainsMap [ proxy . hostname ] = true ;
} ) ;
tokenData . domains = Object . keys ( domainsMap ) ;
tokenData . name = tokenData . domains [ 0 ] ;
2016-09-30 16:33:38 +00:00
program . services = { } ;
program . locals . forEach ( function ( proxy ) {
//program.services = { 'ssh': 22, 'http': 80, 'https': 443 };
program . services [ proxy . protocol ] = proxy . port ;
} ) ;
2016-09-30 19:04:27 +00:00
program . token = program . token || jwt . sign ( tokenData , program . secret || 'shhhhh' ) ;
2016-09-30 16:33:38 +00:00
stunnel . connect ( program ) ;
} ( ) ) ;