Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
R
re6stnet
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Analytics
Analytics
CI / CD
Repository
Value Stream
Wiki
Wiki
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Nicolas Wavrant
re6stnet
Commits
b3c1bb18
Commit
b3c1bb18
authored
Nov 19, 2012
by
Julien Muchembled
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Recover from UPnP failures
parent
f9f4e5f3
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
99 additions
and
45 deletions
+99
-45
re6st/upnpigd.py
re6st/upnpigd.py
+92
-39
re6stnet
re6stnet
+7
-6
No files found.
re6st/upnpigd.py
View file @
b3c1bb18
from
functools
import
wraps
import
miniupnpc
import
logging
import
time
class
Forwarder
:
def
__init__
(
self
):
class
UPnPException
(
Exception
):
pass
class
Forwarder
(
object
):
next_refresh
=
0
_next_retry
=
-
1
_next_port
=
1024
def
__init__
(
self
,
description
):
self
.
_description
=
description
self
.
_u
=
miniupnpc
.
UPnP
()
self
.
_u
.
discoverdelay
=
200
self
.
_rules
=
[]
self
.
_u
.
discover
()
self
.
_u
.
selectigd
()
self
.
_external_ip
=
self
.
_u
.
externalipaddress
()
self
.
next_refresh
=
time
.
time
()
def
addRule
(
self
,
local_port
,
proto
):
# Init parameters
external_port
=
1023
desc
=
're6stnet openvpn %s server'
%
proto
proto
=
proto
.
upper
()
lanaddr
=
self
.
_u
.
lanaddr
# Choose a free port
while
True
:
external_port
+=
1
if
external_port
>
65535
:
raise
Exception
(
'Failed to redirect %u/%s via UPnP'
%
(
local_port
,
proto
))
def
__getattr__
(
self
,
name
):
wrapped
=
getattr
(
self
.
_u
,
name
)
def
wrapper
(
*
args
,
**
kw
):
try
:
if
not
self
.
_u
.
getspecificportmapping
(
external_port
,
proto
):
args
=
external_port
,
proto
,
lanaddr
,
local_port
,
desc
,
''
self
.
_u
.
addportmapping
(
*
args
)
break
return
wrapped
(
*
args
,
**
kw
)
except
Exception
,
e
:
if
str
(
e
)
!=
'ConflictInMappingEntry'
:
raise
logging
.
debug
(
'Forwarding %s:%s to %s:%s'
,
self
.
_external_ip
,
external_port
,
self
.
_u
.
lanaddr
,
local_port
)
self
.
_rules
.
append
(
args
)
return
self
.
_external_ip
,
external_port
raise
UPnPException
(
str
(
e
))
return
wraps
(
wrapped
)(
wrapper
)
def
checkExternalIp
(
self
,
ip
=
None
):
if
not
ip
:
ip
=
self
.
refresh
()
if
not
ip
:
return
()
# If port is None, we assume we're not NATed.
return
[(
ip
,
str
(
port
or
local
),
proto
)
for
local
,
proto
,
port
in
self
.
_rules
]
def
addRule
(
self
,
local_port
,
proto
):
self
.
_rules
.
append
([
local_port
,
proto
,
None
])
def
refresh
(
self
):
logging
.
debug
(
'Refreshing port forwarding'
)
for
args
in
self
.
_rules
:
if
self
.
_next_retry
:
if
time
.
time
()
<
self
.
_next_retry
:
return
self
.
_next_retry
=
0
else
:
try
:
self
.
_u
.
addportmapping
(
*
args
)
except
Exception
,
e
:
if
str
(
e
)
not
in
(
'UnknownError'
,
'Invalid Args'
):
raise
logging
.
warning
(
"Failed to refresh port forwarding: %s"
,
args
)
self
.
next_refresh
=
time
.
time
()
+
500
return
self
.
_refresh
()
except
UPnPException
,
e
:
logging
.
debug
(
"UPnP failure"
,
exc_info
=
1
)
self
.
clear
()
try
:
self
.
discover
()
self
.
selectigd
()
return
self
.
_refresh
()
except
UPnPException
,
e
:
self
.
next_refresh
=
self
.
_next_retry
=
time
.
time
()
+
60
logging
.
info
(
str
(
e
))
self
.
clear
()
def
_refresh
(
self
):
force
=
self
.
next_refresh
<
time
.
time
()
if
force
:
self
.
next_refresh
=
time
.
time
()
+
500
logging
.
debug
(
'Refreshing port forwarding'
)
ip
=
self
.
externalipaddress
()
lanaddr
=
self
.
_u
.
lanaddr
for
r
in
self
.
_rules
:
local
,
proto
,
port
=
r
if
port
and
not
force
:
continue
desc
=
'%s (%u/%s)'
%
(
self
.
_description
,
local
,
proto
)
args
=
proto
.
upper
(),
lanaddr
,
local
,
desc
,
''
while
True
:
if
port
is
None
:
port
=
self
.
_next_port
if
port
>
65535
:
raise
UPnPException
(
'No free port to redirect %s'
%
desc
)
self
.
_next_port
=
port
+
1
try
:
self
.
addportmapping
(
port
,
*
args
)
break
except
UPnPException
,
e
:
if
str
(
e
)
!=
'ConflictInMappingEntry'
:
raise
port
=
None
if
r
[
2
]
!=
port
:
logging
.
debug
(
'%s forwarded from %s:%u'
,
desc
,
ip
,
port
)
r
[
2
]
=
port
return
ip
def
clear
(
self
):
for
args
in
self
.
_rules
:
self
.
_u
.
deleteportmapping
(
args
[
0
],
args
[
1
])
del
self
.
_rules
[:]
try
:
del
self
.
_next_port
except
AttributeError
:
return
for
r
in
self
.
_rules
:
port
=
r
[
2
]
if
port
:
r
[
2
]
=
None
try
:
self
.
deleteportmapping
(
port
,
r
[
1
].
upper
())
except
UPnPException
:
pass
re6stnet
View file @
b3c1bb18
...
...
@@ -11,9 +11,10 @@ def getConfig():
_
(
'--ip'
,
help
=
"IP address advertised to other nodes. Special values:
\
n
"
"- upnp:
force autoconfiguration via UPnP
\
n
"
"- upnp:
redirect ports when UPnP device is found
\
n
"
"- any: ask peers our IP
\
n
"
" (default: ask peers if UPnP fails)"
)
" (default: like 'upnp' if miniupnpc is installed,
\
n
"
" otherwise like 'any')"
)
_
(
'--registry'
,
metavar
=
'URL'
,
help
=
"Public HTTP URL of the registry, for bootstrapping."
)
_
(
'-l'
,
'--log'
,
default
=
'/var/log/re6stnet'
,
...
...
@@ -142,7 +143,7 @@ def main():
logging
.
info
(
'Attempting automatic configuration via UPnP...'
)
try
:
from
re6st.upnpigd
import
Forwarder
forwarder
=
Forwarder
()
forwarder
=
Forwarder
(
're6stnet openvpn server'
)
except
Exception
,
e
:
if
config
.
ip
:
raise
...
...
@@ -150,11 +151,11 @@ def main():
else
:
atexit
.
register
(
forwarder
.
clear
)
for
port
,
proto
in
pp
:
ip
,
port
=
forwarder
.
addRule
(
port
,
proto
)
address
.
append
((
ip
,
str
(
port
),
proto
))
forwarder
.
addRule
(
port
,
proto
)
ip_changed
=
forwarder
.
checkExternalIp
address
=
ip_changed
()
elif
config
.
ip
!=
'any'
:
address
=
ip_changed
(
config
.
ip
)
if
address
:
ip_changed
=
None
for
x
in
pp
:
server_tunnels
.
setdefault
(
're6stnet-'
+
x
[
1
],
x
)
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment