123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102 |
- // Copyright 2023 The frp Authors
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package sub
- import (
- "fmt"
- "net"
- "os"
- "strconv"
- "github.com/spf13/cobra"
- "github.com/fatedier/frp/pkg/config"
- "github.com/fatedier/frp/pkg/nathole"
- )
- var (
- natHoleSTUNServer string
- serverUDPPort int
- )
- func init() {
- RegisterCommonFlags(natholeCmd)
- rootCmd.AddCommand(natholeCmd)
- natholeCmd.AddCommand(natholeDiscoveryCmd)
- natholeCmd.PersistentFlags().StringVarP(&natHoleSTUNServer, "nat_hole_stun_server", "", "stun.easyvoip.com:3478", "STUN server address for nathole")
- natholeCmd.PersistentFlags().IntVarP(&serverUDPPort, "server_udp_port", "", 0, "UDP port of frps for nathole")
- }
- var natholeCmd = &cobra.Command{
- Use: "nathole",
- Short: "Actions about nathole",
- }
- var natholeDiscoveryCmd = &cobra.Command{
- Use: "discover",
- Short: "Discover nathole information by frps and stun server",
- RunE: func(cmd *cobra.Command, args []string) error {
- // ignore error here, because we can use command line pameters
- cfg, _, _, _ := config.ParseClientConfig(cfgFile)
- if natHoleSTUNServer != "" {
- cfg.NatHoleSTUNServer = natHoleSTUNServer
- }
- if serverUDPPort != 0 {
- cfg.ServerUDPPort = serverUDPPort
- }
- if err := validateForNatHoleDiscovery(cfg); err != nil {
- fmt.Println(err)
- os.Exit(1)
- }
- serverAddr := ""
- if cfg.ServerUDPPort != 0 {
- serverAddr = net.JoinHostPort(cfg.ServerAddr, strconv.Itoa(cfg.ServerUDPPort))
- }
- addresses, err := nathole.Discover(
- serverAddr,
- []string{cfg.NatHoleSTUNServer},
- []byte(cfg.Token),
- )
- if err != nil {
- fmt.Println("discover error:", err)
- os.Exit(1)
- }
- if len(addresses) < 2 {
- fmt.Printf("discover error: can not get enough addresses, need 2, got: %v\n", addresses)
- os.Exit(1)
- }
- natType, behavior, err := nathole.ClassifyNATType(addresses)
- if err != nil {
- fmt.Println("classify nat type error:", err)
- os.Exit(1)
- }
- fmt.Println("Your NAT type is:", natType)
- fmt.Println("Behavior is:", behavior)
- fmt.Println("External address is:", addresses)
- return nil
- },
- }
- func validateForNatHoleDiscovery(cfg config.ClientCommonConf) error {
- if cfg.NatHoleSTUNServer == "" {
- return fmt.Errorf("nat_hole_stun_server can not be empty")
- }
- return nil
- }
|