Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
7 changes: 5 additions & 2 deletions Cargo.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

14 changes: 1 addition & 13 deletions linkup-cli/src/commands/server.rs
Original file line number Diff line number Diff line change
Expand Up @@ -5,12 +5,6 @@ use linkup::MemoryStringStore;

#[derive(clap::Args)]
pub struct Args {
#[arg(long)]
session_name: String,

#[arg(long, value_parser, num_args = 1.., value_delimiter = ',')]
domains: Vec<String>,

#[arg(long)]
certs_dir: String,
}
Expand All @@ -19,13 +13,7 @@ pub async fn server(args: &Args) -> Result<()> {
let config_store = MemoryStringStore::default();
let https_certs_dir = PathBuf::from(&args.certs_dir);

linkup_local_server::start(
config_store,
&https_certs_dir,
args.session_name.clone(),
args.domains.clone(),
)
.await;
linkup_local_server::start(config_store, &https_certs_dir).await;

Ok(())
}
22 changes: 14 additions & 8 deletions linkup-cli/src/services/local_server.rs
Original file line number Diff line number Diff line change
Expand Up @@ -13,9 +13,10 @@ use tokio::time::sleep;
use url::Url;

use crate::{
linkup_certs_dir_path, linkup_file_path,
linkup_certs_dir_path, linkup_file_path, services,
state::{upload_state, State},
worker_client, Result,
worker_client::{self, WorkerClient},
Result,
};

use super::{BackgroundService, PidError};
Expand Down Expand Up @@ -50,7 +51,7 @@ impl LocalServer {
Url::parse("http://localhost:80").expect("linkup url invalid")
}

fn start(&self, session_name: String, domains: Vec<String>) -> Result<()> {
fn start(&self) -> Result<()> {
log::debug!("Starting {}", Self::NAME);

let stdout_file = File::create(&self.stdout_file_path)?;
Expand All @@ -66,10 +67,6 @@ impl LocalServer {
command.env("LINKUP_SERVICE_ID", Self::ID);
command.args([
"server",
"--session-name",
&session_name,
"--domains",
&domains.join(","),
"--certs-dir",
linkup_certs_dir_path().to_str().unwrap(),
]);
Expand Down Expand Up @@ -132,7 +129,7 @@ impl BackgroundService for LocalServer {
return Ok(());
}

if let Err(e) = self.start(session_name, domains) {
if let Err(e) = self.start() {
self.notify_update_with_details(
&status_sender,
super::RunStatus::Error,
Expand Down Expand Up @@ -171,6 +168,15 @@ impl BackgroundService for LocalServer {
}
}

// TODO(augustoccesar)[2026-03-26]: Maybe send all the domains on one request?
for domain in &domains {
let full_domain = format!("{session_name}.{domain}");

WorkerClient::new(&services::LocalServer::url(), "")
.create_dns_record(&full_domain)
.await?;
}

match self.update_state(state).await {
Ok(_) => {
self.notify_update(&status_sender, super::RunStatus::Started);
Expand Down
28 changes: 21 additions & 7 deletions linkup-cli/src/worker_client.rs
Original file line number Diff line number Diff line change
Expand Up @@ -70,6 +70,21 @@ impl WorkerClient {
self.post("/linkup/local-session", params).await
}

pub async fn create_dns_record(&self, domain: &str) -> Result<(), Error> {
#[derive(Serialize)]
struct Params {
domain: String,
}

let params = Params {
domain: domain.to_owned(),
};

self.post("/linkup/dns/records", &params).await?;

Ok(())
}

pub async fn get_tunnel(&self, session_name: &str) -> Result<TunnelData, Error> {
let query = GetTunnelParams {
session_name: String::from(session_name),
Expand Down Expand Up @@ -101,15 +116,14 @@ impl WorkerClient {
.send()
.await?;

match response.status() {
StatusCode::OK => {
let content = response.text().await?;
Ok(content)
}
_ => Err(Error::Response(
if response.status().is_success() {
let content = response.text().await?;
Ok(content)
} else {
Err(Error::Response(
response.status(),
response.text().await.unwrap_or_else(|_| "".to_string()),
)),
))
}
}
}
Expand Down
3 changes: 3 additions & 0 deletions local-server/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ path = "src/lib.rs"
[dependencies]
axum = { version = "0.8.1", features = ["http2", "json", "ws"] }
axum-server = { version = "0.8.0", features = ["tls-rustls"] }
async-trait = "0.1.43"
http = "1.2.0"
hickory-server = { version = "0.25.1", features = ["resolver"] }
hyper = { version = "1.5.2", features = ["server"] }
Expand All @@ -22,6 +23,8 @@ futures = "0.3.31"
linkup = { path = "../linkup" }
rustls = { version = "0.23.37", default-features = false, features = ["ring"] }
rustls-native-certs = "0.8.1"
serde = "1.0.217"
serde_json = "1.0.137"
thiserror = "2.0.11"
tokio = { version = "1.49.0", features = [
"macros",
Expand Down
127 changes: 91 additions & 36 deletions local-server/src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,7 @@ use hickory_server::{
config::{NameServerConfig, NameServerConfigGroup, ResolverOpts},
name_server::TokioConnectionProvider,
},
server::{RequestHandler, ResponseHandler, ResponseInfo},
store::{
forwarder::{ForwardAuthority, ForwardConfig},
in_memory::InMemoryAuthority,
Expand All @@ -34,13 +35,15 @@ use linkup::{
Session, SessionAllocator, TargetService, UpdateSessionRequest,
};
use rustls::ServerConfig;
use serde::Deserialize;
use std::{
net::{Ipv4Addr, SocketAddr},
ops::Deref,
path::PathBuf,
str::FromStr,
};
use std::{path::Path, sync::Arc};
use tokio::{net::UdpSocket, select, signal};
use tokio::{net::UdpSocket, select, signal, sync::RwLock};
use tokio_tungstenite::tungstenite::client::IntoClientRequest;
use tower::ServiceBuilder;
use tower_http::trace::{DefaultOnRequest, DefaultOnResponse, TraceLayer};
Expand Down Expand Up @@ -80,14 +83,52 @@ impl IntoResponse for ApiError {
}
}

pub fn linkup_router(config_store: MemoryStringStore) -> Router {
#[derive(Clone)]
pub struct DnsCatalog(Arc<RwLock<Catalog>>);

impl DnsCatalog {
pub fn new() -> Self {
Self(Arc::new(RwLock::new(Catalog::new())))
}
}

impl Default for DnsCatalog {
fn default() -> Self {
Self::new()
}
}

impl Deref for DnsCatalog {
type Target = Arc<RwLock<Catalog>>;

fn deref(&self) -> &Self::Target {
&self.0
}
}

#[async_trait::async_trait]
impl RequestHandler for DnsCatalog {
async fn handle_request<R: ResponseHandler>(
&self,
request: &hickory_server::server::Request,
response_handle: R,
) -> ResponseInfo {
let catalog = self.read().await;

catalog.handle_request(request, response_handle).await
}
}

pub fn linkup_router(config_store: MemoryStringStore, dns_catalog: DnsCatalog) -> Router {
let client = https_client();

Router::new()
.route("/linkup/local-session", post(linkup_config_handler))
.route("/linkup/check", get(always_ok))
.route("/linkup/dns/records", post(dns_create)) // TODO: Modify me
.fallback(any(linkup_request_handler))
.layer(Extension(config_store))
.layer(Extension(dns_catalog))
.layer(Extension(client))
.layer(
ServiceBuilder::new()
Expand All @@ -100,24 +141,21 @@ pub fn linkup_router(config_store: MemoryStringStore) -> Router {
)
}

pub async fn start(
config_store: MemoryStringStore,
certs_dir: &Path,
session_name: String,
domains: Vec<String>,
) {
pub async fn start(config_store: MemoryStringStore, certs_dir: &Path) {
let dns_catalog = DnsCatalog::new();

let http_config_store = config_store.clone();
let https_config_store = config_store.clone();
let https_certs_dir = PathBuf::from(certs_dir);

select! {
() = start_server_http(http_config_store) => {
() = start_server_http(http_config_store, dns_catalog.clone()) => {
println!("HTTP server shut down");
},
() = start_server_https(https_config_store, &https_certs_dir) => {
() = start_server_https(https_config_store, &https_certs_dir, dns_catalog.clone()) => {
println!("HTTPS server shut down");
},
() = start_dns_server(session_name, domains) => {
() = start_dns_server(dns_catalog.clone()) => {
println!("DNS server shut down");
},
() = shutdown_signal() => {
Expand All @@ -126,7 +164,11 @@ pub async fn start(
}
}

async fn start_server_https(config_store: MemoryStringStore, certs_dir: &Path) {
async fn start_server_https(
config_store: MemoryStringStore,
certs_dir: &Path,
dns_catalog: DnsCatalog,
) {
let _ = rustls::crypto::ring::default_provider().install_default();

let sni = match certificates::WildcardSniResolver::load_dir(certs_dir) {
Expand All @@ -145,7 +187,7 @@ async fn start_server_https(config_store: MemoryStringStore, certs_dir: &Path) {
.with_cert_resolver(Arc::new(sni));
server_config.alpn_protocols = vec![b"h2".to_vec(), b"http/1.1".to_vec()];

let app = linkup_router(config_store);
let app = linkup_router(config_store, dns_catalog);

let addr = SocketAddr::from(([0, 0, 0, 0], 443));
println!("HTTPS listening on {}", &addr);
Expand All @@ -156,8 +198,8 @@ async fn start_server_https(config_store: MemoryStringStore, certs_dir: &Path) {
.expect("failed to start HTTPS server");
}

async fn start_server_http(config_store: MemoryStringStore) {
let app = linkup_router(config_store);
async fn start_server_http(config_store: MemoryStringStore, dns_catalog: DnsCatalog) {
let app = linkup_router(config_store, dns_catalog);

let addr = SocketAddr::from(([0, 0, 0, 0], 80));
println!("HTTP listening on {}", &addr);
Expand All @@ -171,25 +213,7 @@ async fn start_server_http(config_store: MemoryStringStore) {
.expect("failed to start HTTP server");
}

async fn start_dns_server(linkup_session_name: String, domains: Vec<String>) {
let mut catalog = Catalog::new();

for domain in &domains {
let record_name = Name::from_str(&format!("{linkup_session_name}.{domain}.")).unwrap();

let authority = InMemoryAuthority::empty(record_name.clone(), ZoneType::Primary, false);

let record = Record::from_rdata(
record_name.clone(),
3600,
RData::A(Ipv4Addr::new(127, 0, 0, 1).into()),
);

authority.upsert(record, 0).await;

catalog.upsert(record_name.clone().into(), vec![Arc::new(authority)]);
}

async fn start_dns_server(dns_catalog: DnsCatalog) {
let cf_name_server = NameServerConfig::new("1.1.1.1:53".parse().unwrap(), Protocol::Udp);
let forward_config = ForwardConfig {
name_servers: NameServerConfigGroup::from(vec![cf_name_server]),
Expand All @@ -202,12 +226,15 @@ async fn start_dns_server(linkup_session_name: String, domains: Vec<String>) {
.build()
.unwrap();

catalog.upsert(Name::root().into(), vec![Arc::new(forwarder)]);
{
let mut catalog = dns_catalog.write().await;
catalog.upsert(Name::root().into(), vec![Arc::new(forwarder)]);
}

let addr = SocketAddr::from(([0, 0, 0, 0], 8053));
let sock = UdpSocket::bind(&addr).await.unwrap();

let mut server = ServerFuture::new(catalog);
let mut server = ServerFuture::new(dns_catalog);
server.register_socket(sock);

println!("listening on {addr}");
Expand Down Expand Up @@ -427,6 +454,34 @@ async fn always_ok() -> &'static str {
"OK"
}

#[derive(Deserialize)]
pub struct CreateDnsRecord {
pub domain: String,
}

async fn dns_create(
Extension(dns_catalog): Extension<DnsCatalog>,
Json(payload): Json<CreateDnsRecord>,
) -> impl IntoResponse {
let mut catalog = dns_catalog.write().await;

let record_name = Name::from_str(&format!("{}.", payload.domain)).unwrap();

let authority = InMemoryAuthority::empty(record_name.clone(), ZoneType::Primary, false);

let record = Record::from_rdata(
record_name.clone(),
3600,
RData::A(Ipv4Addr::new(127, 0, 0, 1).into()),
);

authority.upsert(record, 0).await;

catalog.upsert(record_name.clone().into(), vec![Arc::new(authority)]);

StatusCode::CREATED.into_response()
}

fn https_client() -> HttpsClient {
let _ = rustls::crypto::ring::default_provider().install_default();

Expand Down
Loading
Loading