2023-03-30 20:28:15 +08:00
|
|
|
// Copyright 2023 The frp Authors
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package sub
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"net"
|
|
|
|
"os"
|
|
|
|
"strconv"
|
|
|
|
|
|
|
|
"github.com/spf13/cobra"
|
|
|
|
|
|
|
|
"github.com/fatedier/frp/pkg/config"
|
|
|
|
"github.com/fatedier/frp/pkg/nathole"
|
|
|
|
)
|
|
|
|
|
2023-04-10 21:45:00 +08:00
|
|
|
var (
|
|
|
|
natHoleSTUNServer string
|
|
|
|
serverUDPPort int
|
|
|
|
)
|
2023-03-30 22:02:00 +08:00
|
|
|
|
2023-03-30 20:28:15 +08:00
|
|
|
func init() {
|
|
|
|
RegisterCommonFlags(natholeCmd)
|
|
|
|
|
|
|
|
rootCmd.AddCommand(natholeCmd)
|
|
|
|
natholeCmd.AddCommand(natholeDiscoveryCmd)
|
2023-03-30 22:02:00 +08:00
|
|
|
|
2023-04-10 21:45:00 +08:00
|
|
|
natholeCmd.PersistentFlags().StringVarP(&natHoleSTUNServer, "nat_hole_stun_server", "", "stun.easyvoip.com:3478", "STUN server address for nathole")
|
|
|
|
natholeCmd.PersistentFlags().IntVarP(&serverUDPPort, "server_udp_port", "", 0, "UDP port of frps for nathole")
|
2023-03-30 20:28:15 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
var natholeCmd = &cobra.Command{
|
|
|
|
Use: "nathole",
|
|
|
|
Short: "Actions about nathole",
|
|
|
|
}
|
|
|
|
|
|
|
|
var natholeDiscoveryCmd = &cobra.Command{
|
|
|
|
Use: "discover",
|
|
|
|
Short: "Discover nathole information by frps and stun server",
|
|
|
|
RunE: func(cmd *cobra.Command, args []string) error {
|
2023-04-10 21:45:00 +08:00
|
|
|
// ignore error here, because we can use command line pameters
|
|
|
|
cfg, _, _, _ := config.ParseClientConfig(cfgFile)
|
2023-03-30 22:02:00 +08:00
|
|
|
if natHoleSTUNServer != "" {
|
|
|
|
cfg.NatHoleSTUNServer = natHoleSTUNServer
|
|
|
|
}
|
2023-04-10 21:45:00 +08:00
|
|
|
if serverUDPPort != 0 {
|
|
|
|
cfg.ServerUDPPort = serverUDPPort
|
|
|
|
}
|
2023-03-30 20:28:15 +08:00
|
|
|
|
|
|
|
if err := validateForNatHoleDiscovery(cfg); err != nil {
|
|
|
|
fmt.Println(err)
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
|
|
|
|
2023-03-30 21:49:12 +08:00
|
|
|
serverAddr := ""
|
|
|
|
if cfg.ServerUDPPort != 0 {
|
|
|
|
serverAddr = net.JoinHostPort(cfg.ServerAddr, strconv.Itoa(cfg.ServerUDPPort))
|
|
|
|
}
|
2023-03-30 20:28:15 +08:00
|
|
|
addresses, err := nathole.Discover(
|
2023-03-30 21:49:12 +08:00
|
|
|
serverAddr,
|
2023-03-30 20:28:15 +08:00
|
|
|
[]string{cfg.NatHoleSTUNServer},
|
|
|
|
[]byte(cfg.Token),
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
fmt.Println("discover error:", err)
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
2023-03-30 21:49:12 +08:00
|
|
|
if len(addresses) < 2 {
|
|
|
|
fmt.Printf("discover error: can not get enough addresses, need 2, got: %v\n", addresses)
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
2023-03-30 20:28:15 +08:00
|
|
|
|
|
|
|
natType, behavior, err := nathole.ClassifyNATType(addresses)
|
|
|
|
if err != nil {
|
|
|
|
fmt.Println("classify nat type error:", err)
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
|
|
|
fmt.Println("Your NAT type is:", natType)
|
|
|
|
fmt.Println("Behavior is:", behavior)
|
|
|
|
fmt.Println("External address is:", addresses)
|
|
|
|
return nil
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
func validateForNatHoleDiscovery(cfg config.ClientCommonConf) error {
|
|
|
|
if cfg.NatHoleSTUNServer == "" {
|
|
|
|
return fmt.Errorf("nat_hole_stun_server can not be empty")
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|