mirror of
https://github.com/Gouryella/drip.git
synced 2026-03-01 07:42:32 +00:00
- Implement IP whitelist/blacklist access control mechanism - Add --allow-ip and --deny-ip command-line arguments to configure IP access rules - Support CIDR format for IP range configuration - Enable IP access control in HTTP, HTTPS, and TCP tunnels - Add IP access check logic to server-side proxy handling - Update documentation to explain how to use IP access control
86 lines
2.6 KiB
Go
86 lines
2.6 KiB
Go
package cli
|
|
|
|
import (
|
|
"fmt"
|
|
"strconv"
|
|
|
|
"drip/internal/client/tcp"
|
|
"drip/internal/shared/protocol"
|
|
|
|
"github.com/spf13/cobra"
|
|
)
|
|
|
|
var tcpCmd = &cobra.Command{
|
|
Use: "tcp <port>",
|
|
Short: "Start TCP tunnel",
|
|
Long: `Start a TCP tunnel to expose any TCP service.
|
|
|
|
Example:
|
|
drip tcp 5432 Tunnel PostgreSQL
|
|
drip tcp 3306 Tunnel MySQL
|
|
drip tcp 22 Tunnel SSH
|
|
drip tcp 6379 --subdomain myredis Tunnel Redis with custom subdomain
|
|
drip tcp 5432 --allow-ip 192.168.0.0/16 Only allow IPs from 192.168.x.x
|
|
drip tcp 22 --allow-ip 10.0.0.1 Allow single IP
|
|
drip tcp 22 --deny-ip 1.2.3.4 Block specific IP
|
|
|
|
Supported Services:
|
|
- Databases: PostgreSQL (5432), MySQL (3306), Redis (6379), MongoDB (27017)
|
|
- SSH: Port 22
|
|
- Any TCP service
|
|
|
|
Configuration:
|
|
First time: Run 'drip config init' to save server and token
|
|
Subsequent: Just run 'drip tcp <port>'
|
|
|
|
Note: Uses TCP over TLS 1.3 for secure communication`,
|
|
Args: cobra.ExactArgs(1),
|
|
RunE: runTCP,
|
|
}
|
|
|
|
func init() {
|
|
tcpCmd.Flags().StringVarP(&subdomain, "subdomain", "n", "", "Custom subdomain (optional)")
|
|
tcpCmd.Flags().BoolVarP(&daemonMode, "daemon", "d", false, "Run in background (daemon mode)")
|
|
tcpCmd.Flags().StringVarP(&localAddress, "address", "a", "127.0.0.1", "Local address to forward to (default: 127.0.0.1)")
|
|
tcpCmd.Flags().StringSliceVar(&allowIPs, "allow-ip", nil, "Allow only these IPs or CIDR ranges (e.g., 192.168.1.1,10.0.0.0/8)")
|
|
tcpCmd.Flags().StringSliceVar(&denyIPs, "deny-ip", nil, "Deny these IPs or CIDR ranges (e.g., 1.2.3.4,192.168.1.0/24)")
|
|
tcpCmd.Flags().BoolVar(&daemonMarker, "daemon-child", false, "Internal flag for daemon child process")
|
|
tcpCmd.Flags().MarkHidden("daemon-child")
|
|
rootCmd.AddCommand(tcpCmd)
|
|
}
|
|
|
|
func runTCP(_ *cobra.Command, args []string) error {
|
|
port, err := strconv.Atoi(args[0])
|
|
if err != nil || port < 1 || port > 65535 {
|
|
return fmt.Errorf("invalid port number: %s", args[0])
|
|
}
|
|
|
|
if daemonMode && !daemonMarker {
|
|
return StartDaemon("tcp", port, buildDaemonArgs("tcp", args, subdomain, localAddress))
|
|
}
|
|
|
|
serverAddr, token, err := resolveServerAddrAndToken("tcp", port)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
connConfig := &tcp.ConnectorConfig{
|
|
ServerAddr: serverAddr,
|
|
Token: token,
|
|
TunnelType: protocol.TunnelTypeTCP,
|
|
LocalHost: localAddress,
|
|
LocalPort: port,
|
|
Subdomain: subdomain,
|
|
Insecure: insecure,
|
|
AllowIPs: allowIPs,
|
|
DenyIPs: denyIPs,
|
|
}
|
|
|
|
var daemon *DaemonInfo
|
|
if daemonMarker {
|
|
daemon = newDaemonInfo("tcp", port, subdomain, serverAddr)
|
|
}
|
|
|
|
return runTunnelWithUI(connConfig, daemon)
|
|
}
|