19 Commits

Author SHA1 Message Date
a1ecf85cbb updated changelog with dates. 2024-11-29 15:25:56 +00:00
6c83d6ad2c add multi platform targets to makefile 2024-11-29 04:34:12 +00:00
c2266ac9d9 target host is now configurable.
stale session timeout default value increased
2024-11-29 04:33:47 +00:00
b0a6ba8180 add link to q3rcon client 2024-11-29 04:29:18 +00:00
9b4a05c0f4 add .dockerignore 2024-11-12 10:12:36 +00:00
bfe31c28c8 no need to export sessionCache methods
rename upsert to insert since we only call it if there isn't a session.
2024-10-23 17:22:03 +01:00
abc1ea9d3f rename Q3RCON_STALE_SESSION_TIMEOUT to Q3RCON_SESSION_TIMEOUT 2024-10-23 16:45:05 +01:00
82ca15f70e add sessionCache, use it to store sessions. 2024-10-23 16:44:35 +01:00
8cb5bc03c5 upd comment 2024-10-19 22:01:47 +01:00
939d419438 use multi-stage build 2024-10-19 21:59:24 +01:00
c42df03858 read from env var Q3RCON_STALE_SESSION_TIMEOUT 2024-10-19 21:19:33 +01:00
64c1df645d add WithStaleTimeout Option function.
add a trace level log when a session gets deleted.
2024-10-19 21:19:03 +01:00
51f22f480b add Logging section to README. 2024-09-28 15:37:38 +01:00
3d1c8f90f3 remove init function\
remove global vars proxies, host
2024-09-28 15:36:24 +01:00
2fc0f7a74f log challenge requests 2024-09-28 15:36:04 +01:00
6cd90ae1dd reuse single buffers 2024-09-28 00:38:55 +01:00
826756eb6e rename comparand arg 2024-04-14 19:13:56 +01:00
05fb7bdd0f add compare helper method
split up long conditionals
2024-04-14 08:27:30 +01:00
e8f213fded easier to read? 2024-04-11 23:40:25 +01:00
12 changed files with 307 additions and 115 deletions

6
.dockerignore Normal file
View File

@@ -0,0 +1,6 @@
*
!cmd/
!pkg/
!go.mod
!go.sum

5
.gitignore vendored
View File

@@ -7,6 +7,7 @@
*.dll *.dll
*.so *.so
*.dylib *.dylib
bin/
# Test binary, built with `go test -c` # Test binary, built with `go test -c`
*.test *.test
@@ -19,3 +20,7 @@
# Go workspace file # Go workspace file
go.work go.work
# testing
run.sh
server.yaml

View File

@@ -11,6 +11,38 @@ Before any major/minor/patch bump all unit tests will be run to verify they pass
- [x] - [x]
## [1.4.0] - 2024-11-29
### Added
- new environment variable `Q3RCON_TARGET_HOST` for setting the host the gameserver is on.
### Changed
- environment variable `Q3RCON_HOST` renamed to `Q3RCON_PROXY_HOST`
- environment variable `Q3RCON_PROXY` renamed to `Q3RCON_TARGET_PORTS`.
- default session timeout changed from 5 to 20 minutes.
## [1.3.0] - 2024-10-23
### Added
- Add sessionCache for tracking sessions.
- Functional option `WithStaleTimeout` renamed to `WithSessionTimeout`
## [1.2.0] - 2024-10-19
### Added
- optional function `WithStaleTimeout`, use it to configure the session timeout value.
- it defaults to 5 minutes.
## [1.1.0] - 2024-09-28
### Added
- connection (challenge) requests are now logged.
## [0.6.0] - 2024-03-21 ## [0.6.0] - 2024-03-21
### Added ### Added

View File

@@ -1,4 +1,4 @@
FROM golang:1.21 FROM golang:1.21 AS build_image
WORKDIR /usr/src/app WORKDIR /usr/src/app
@@ -6,9 +6,16 @@ WORKDIR /usr/src/app
COPY go.mod go.sum ./ COPY go.mod go.sum ./
RUN go mod download && go mod verify RUN go mod download && go mod verify
# build binary and place into /usr/local/bin/
COPY . . COPY . .
RUN go build -v -o /usr/local/bin/q3rcon-proxy ./cmd/q3rcon-proxy/
# build binary, place into ./bin/
RUN CGO_ENABLED=0 GOOS=linux go build -o ./bin/q3rcon-proxy ./cmd/q3rcon-proxy/
FROM scratch AS final_image
WORKDIR /bin/
COPY --from=build_image /usr/src/app/bin/q3rcon-proxy .
# Command to run when starting the container # Command to run when starting the container
ENTRYPOINT [ "q3rcon-proxy" ] ENTRYPOINT [ "./q3rcon-proxy" ]

View File

@@ -1,2 +1,40 @@
go-build: program = q3rcon-proxy
go build ./cmd/q3rcon-proxy/
GO = @go
BIN_DIR := bin
WINDOWS=$(BIN_DIR)/$(program)_windows_amd64.exe
LINUX=$(BIN_DIR)/$(program)_linux_amd64
VERSION=$(shell git describe --tags --always --long --dirty)
.DEFAULT_GOAL := build
.PHONY: fmt vet build windows linux test clean
fmt:
$(GO) fmt ./...
vet: fmt
$(GO) vet ./...
build: vet windows linux | $(BIN_DIR)
@echo version: $(VERSION)
windows: $(WINDOWS)
linux: $(LINUX)
$(WINDOWS):
env GOOS=windows GOARCH=amd64 go build -v -o $(WINDOWS) -ldflags="-s -w -X main.version=$(VERSION)" ./cmd/q3rcon-proxy/
$(LINUX):
env GOOS=linux GOARCH=amd64 go build -v -o $(LINUX) -ldflags="-s -w -X main.version=$(VERSION)" ./cmd/q3rcon-proxy/
test:
$(GO) test ./...
$(BIN_DIR):
@mkdir -p $@
clean:
@rm -rv $(BIN_DIR)

View File

@@ -2,23 +2,29 @@
A modification of [lilproxy][lilproxy_url] that forwards only Q3 rcon/query packets. Useful for separating the rcon port from the game server port. A modification of [lilproxy][lilproxy_url] that forwards only Q3 rcon/query packets. Useful for separating the rcon port from the game server port.
### Why
Unfortunately the Q3Rcon engine ties the rcon port to the game servers public port used for client connections. This proxy will allow you to run rcon through a separate whitelisted port.
### Use ### Use
Run one or multiple rcon proxies by setting an environment variable `Q3RCON_PROXY` Run one or multiple rcon proxies by setting an environment variable `Q3RCON_TARGET_PORTS`
for example: for example:
```bash ```bash
export Q3RCON_PROXY="20000:28960;20001:28961;20002:28962" export Q3RCON_TARGET_PORTS="20000:28960;20001:28961;20002:28962"
``` ```
This would configure q3rcon-proxy to run 3 proxy servers listening on ports `20000`, `20001` and `20002` that redirect rcon requests to game servers on ports `28960`, `28961` and `28962` respectively. This would configure q3rcon-proxy to run 3 proxy servers listening on ports `20000`, `20001` and `20002` that redirect rcon requests to game servers on ports `28960`, `28961` and `28962` respectively.
Then just run the binary which you can compile yourself, download from `Releases` or use the included Dockerfile. Then just run the binary which you can compile yourself, download from `Releases` or use the included Dockerfile.
### Why ### Logging
Avoid sending plaintext rcon commands to the public game server port. In general I would advise anyone using rcon remotely to use a secured connection but perhaps you've passed rcon to a clan friend who doesn't know about secured connections. Now you can instruct them to use rcon only through a whitelisted port. Set the log level with environment variable `Q3RCON_LOGLEVEL`:
`0 = Panic, 1 = Fatal, 2 = Error, 3 = Warning, 4 = Info, 5 = Debug, 6 = Trace`
### Special Thanks ### Special Thanks
@@ -26,3 +32,9 @@ Avoid sending plaintext rcon commands to the public game server port. In general
[lilproxy_url]: https://github.com/dgparker/lilproxy [lilproxy_url]: https://github.com/dgparker/lilproxy
[user_link]: https://github.com/dgparker [user_link]: https://github.com/dgparker
### Further Notes
For a compatible rcon client also written in Go consider checking out the [Q3 Rcon][q3rcon] package.
[q3rcon]: https://github.com/onyx-and-iris/q3rcon

View File

@@ -3,74 +3,71 @@ package main
import ( import (
"fmt" "fmt"
"os" "os"
"strconv" "slices"
"strings" "strings"
"time"
log "github.com/sirupsen/logrus" log "github.com/sirupsen/logrus"
"github.com/onyx-and-iris/q3rcon-proxy/pkg/udpproxy" "github.com/onyx-and-iris/q3rcon-proxy/pkg/udpproxy"
) )
func start(proxy string) { func main() {
port, target := func() (string, string) { logLevel, err := getEnvInt("Q3RCON_LOGLEVEL")
x := strings.Split(proxy, ":") if err != nil {
log.Fatalf("unable to parse Q3RCON_LEVEL: %s", err.Error())
}
if slices.Contains(log.AllLevels, log.Level(logLevel)) {
log.SetLevel(log.Level(logLevel))
}
proxyHost := os.Getenv("Q3RCON_PROXY_HOST")
if proxyHost == "" {
proxyHost = "0.0.0.0"
}
targetHost := os.Getenv("Q3RCON_TARGET_HOST")
if targetHost == "" {
targetHost = "127.0.0.1"
}
proxies := os.Getenv("Q3RCON_TARGET_PORTS")
if proxies == "" {
log.Fatal("env Q3RCON_TARGET_PORTS required")
}
sessionTimeout, err := getEnvInt("Q3RCON_SESSION_TIMEOUT")
if err != nil {
log.Fatalf("unable to parse Q3RCON_SESSION_TIMEOUT: %s", err.Error())
}
if sessionTimeout == 0 {
sessionTimeout = 20
}
for _, proxy := range strings.Split(proxies, ";") {
go start(proxyHost, targetHost, proxy, sessionTimeout)
}
<-make(chan struct{})
}
func start(proxyHost, targetHost, ports string, sessionTimeout int) {
proxyPort, targetPort := func() (string, string) {
x := strings.Split(ports, ":")
return x[0], x[1] return x[0], x[1]
}() }()
c, err := udpproxy.New(fmt.Sprintf("%s:%s", host, port), fmt.Sprintf("127.0.0.1:%s", target)) hostAddr := fmt.Sprintf("%s:%s", proxyHost, proxyPort)
proxyAddr := fmt.Sprintf("%s:%s", targetHost, targetPort)
c, err := udpproxy.New(
hostAddr, proxyAddr,
udpproxy.WithSessionTimeout(time.Duration(sessionTimeout)*time.Minute))
if err != nil { if err != nil {
log.Fatal(err) log.Fatal(err)
} }
log.Printf("q3rcon-proxy initialized: [proxy] (%s:%s) [target] (127.0.0.1:%s)", host, port, target) log.Printf("q3rcon-proxy initialized: [proxy] (%s) [target] (%s)", hostAddr, proxyAddr)
log.Fatal(c.ListenAndServe()) log.Fatal(c.ListenAndServe())
} }
var (
proxies, host string
)
func getenvInt(key string) (int, error) {
s := os.Getenv(key)
if s == "" {
return 0, nil
}
v, err := strconv.Atoi(s)
if err != nil {
return 0, err
}
return v, nil
}
func init() {
proxies = os.Getenv("Q3RCON_PROXY")
if proxies == "" {
log.Fatal("env Q3RCON_PROXY required")
}
host = os.Getenv("Q3RCON_HOST")
if host == "" {
host = "0.0.0.0"
}
debug, err := getenvInt("Q3RCON_DEBUG")
if err != nil {
log.Fatal(err)
}
if debug == 1 {
log.SetLevel(log.DebugLevel)
} else {
log.SetLevel(log.InfoLevel)
}
}
func main() {
for _, proxy := range strings.Split(proxies, ";") {
go start(proxy)
}
<-make(chan int)
}

18
cmd/q3rcon-proxy/util.go Normal file
View File

@@ -0,0 +1,18 @@
package main
import (
"os"
"strconv"
)
func getEnvInt(key string) (int, error) {
s := os.Getenv(key)
if s == "" {
return 0, nil
}
v, err := strconv.Atoi(s)
if err != nil {
return 0, err
}
return v, nil
}

View File

@@ -2,6 +2,7 @@ package udpproxy
import ( import (
"errors" "errors"
"fmt"
"net" "net"
"strings" "strings"
"time" "time"
@@ -38,8 +39,8 @@ func newSession(caddr *net.UDPAddr, raddr *net.UDPAddr, proxyConn *net.UDPConn)
} }
func (s *session) listen() error { func (s *session) listen() error {
buf := make([]byte, 2048)
for { for {
buf := make([]byte, 2048)
n, err := s.serverConn.Read(buf) n, err := s.serverConn.Read(buf)
if err != nil { if err != nil {
log.Error(err) log.Error(err)
@@ -68,7 +69,7 @@ func (s *session) proxyFrom(buf []byte) error {
if s.isBadRconResponse(buf) { if s.isBadRconResponse(buf) {
log.Infof("Response: Bad rcon from %s", s.caddr.IP) log.Infof("Response: Bad rcon from %s", s.caddr.IP)
} else { } else {
log.Debugf("Response: %s", string(buf[10:])) log.Debugf("Response: %s", string(buf[len(s.rconResponseHeader):]))
} }
} }
@@ -77,7 +78,13 @@ func (s *session) proxyFrom(buf []byte) error {
func (s *session) proxyTo(buf []byte) error { func (s *session) proxyTo(buf []byte) error {
if !s.isValidRequestPacket(buf) { if !s.isValidRequestPacket(buf) {
err := errors.New("not a rcon or query request packet") var err error
if s.isChallengeRequestPacket(buf) {
parts := strings.SplitN(string(buf), " ", 3)
err = fmt.Errorf("invalid challenge from %s with GUID: %s", s.caddr.IP, parts[len(parts)-1])
} else {
err = errors.New("not a rcon or query request packet")
}
log.Error(err.Error()) log.Error(err.Error())
return err return err
} }

View File

@@ -0,0 +1,41 @@
package udpproxy
import "sync"
// sessionCache tracks connection sessions
type sessionCache struct {
mu sync.RWMutex
data map[string]*session
}
// newSessionCache creates a usable sessionCache.
func newSessionCache() sessionCache {
return sessionCache{
data: make(map[string]*session),
}
}
// read returns the associated session for an addr
func (sc *sessionCache) read(addr string) (*session, bool) {
sc.mu.RLock()
defer sc.mu.RUnlock()
v, ok := sc.data[addr]
return v, ok
}
// insert adds a session for a given addr.
func (sc *sessionCache) insert(addr string, session *session) {
sc.mu.Lock()
defer sc.mu.Unlock()
sc.data[addr] = session
}
// delete removes the session for the given addr.
func (sc *sessionCache) delete(addr string) {
sc.mu.Lock()
defer sc.mu.Unlock()
delete(sc.data, addr)
}

View File

@@ -2,24 +2,38 @@ package udpproxy
import ( import (
"net" "net"
"sync"
"time" "time"
log "github.com/sirupsen/logrus" log "github.com/sirupsen/logrus"
) )
// Option is a functional option type that allows us to configure the Client.
type Option func(*Client)
// WithSessionTimeout is a functional option to set the session timeout
func WithSessionTimeout(timeout time.Duration) Option {
return func(c *Client) {
if timeout < time.Minute {
log.Warnf("cannot set stale session timeout to less than 1 minute.. defaulting to 20 minutes")
return
}
c.sessionTimeout = timeout
}
}
type Client struct { type Client struct {
laddr *net.UDPAddr laddr *net.UDPAddr
raddr *net.UDPAddr raddr *net.UDPAddr
proxyConn *net.UDPConn proxyConn *net.UDPConn
mutex sync.RWMutex sessionCache sessionCache
sessions map[string]*session sessionTimeout time.Duration
} }
func New(port, target string) (*Client, error) { func New(proxy, target string, options ...Option) (*Client, error) {
laddr, err := net.ResolveUDPAddr("udp", port) laddr, err := net.ResolveUDPAddr("udp", proxy)
if err != nil { if err != nil {
return nil, err return nil, err
} }
@@ -29,12 +43,18 @@ func New(port, target string) (*Client, error) {
return nil, err return nil, err
} }
return &Client{ c := &Client{
laddr: laddr, laddr: laddr,
raddr: raddr, raddr: raddr,
mutex: sync.RWMutex{}, sessionCache: newSessionCache(),
sessions: map[string]*session{}, sessionTimeout: 20 * time.Minute,
}, nil }
for _, o := range options {
o(c)
}
return c, nil
} }
func (c *Client) ListenAndServe() error { func (c *Client) ListenAndServe() error {
@@ -46,22 +66,22 @@ func (c *Client) ListenAndServe() error {
go c.pruneSessions() go c.pruneSessions()
buf := make([]byte, 2048)
for { for {
buf := make([]byte, 2048)
n, caddr, err := c.proxyConn.ReadFromUDP(buf) n, caddr, err := c.proxyConn.ReadFromUDP(buf)
if err != nil { if err != nil {
log.Error(err) log.Error(err)
} }
session, found := c.sessions[caddr.String()] session, ok := c.sessionCache.read(caddr.String())
if !found { if !ok {
session, err = newSession(caddr, c.raddr, c.proxyConn) session, err = newSession(caddr, c.raddr, c.proxyConn)
if err != nil { if err != nil {
log.Error(err) log.Error(err)
continue continue
} }
c.sessions[caddr.String()] = session c.sessionCache.insert(caddr.String(), session)
} }
go session.proxyTo(buf[:n]) go session.proxyTo(buf[:n])
@@ -71,15 +91,12 @@ func (c *Client) ListenAndServe() error {
func (c *Client) pruneSessions() { func (c *Client) pruneSessions() {
ticker := time.NewTicker(1 * time.Minute) ticker := time.NewTicker(1 * time.Minute)
// the locks here could be abusive and i dont even know if this is a real
// problem but we definitely need to clean up stale sessions
for range ticker.C { for range ticker.C {
for _, session := range c.sessions { for _, session := range c.sessionCache.data {
c.mutex.RLock() if time.Since(session.updateTime) > c.sessionTimeout {
if time.Since(session.updateTime) > time.Minute*5 { c.sessionCache.delete(session.caddr.String())
delete(c.sessions, session.caddr.String()) log.Tracef("session for %s deleted", session.caddr)
} }
c.mutex.RUnlock()
} }
} }
} }

View File

@@ -3,51 +3,63 @@ package udpproxy
import "bytes" import "bytes"
type validator struct { type validator struct {
rconRequestHeader []byte rconRequestHeader []byte
getstatusRequestHeader []byte getstatusRequestHeader []byte
getinfoRequestHeader []byte getinfoRequestHeader []byte
rconResponseHeader []byte getchallengeRequestHeader []byte
getstatusResponseHeader []byte rconResponseHeader []byte
getinfoResponseHeader []byte getstatusResponseHeader []byte
badRconIdentifier []byte getinfoResponseHeader []byte
badRconIdentifier []byte
} }
func newValidator() validator { func newValidator() validator {
return validator{ return validator{
rconRequestHeader: []byte("\xff\xff\xff\xffrcon"), rconRequestHeader: []byte("\xff\xff\xff\xffrcon"),
getstatusRequestHeader: []byte("\xff\xff\xff\xffgetstatus"), getstatusRequestHeader: []byte("\xff\xff\xff\xffgetstatus"),
getinfoRequestHeader: []byte("\xff\xff\xff\xffgetinfo"), getinfoRequestHeader: []byte("\xff\xff\xff\xffgetinfo"),
rconResponseHeader: []byte("\xff\xff\xff\xffprint\n"), getchallengeRequestHeader: []byte("\xff\xff\xff\xffgetchallenge"),
getstatusResponseHeader: []byte("\xff\xff\xff\xffstatusResponse\n"), rconResponseHeader: []byte("\xff\xff\xff\xffprint\n"),
getinfoResponseHeader: []byte("\xff\xff\xff\xffinfoResponse\n"), getstatusResponseHeader: []byte("\xff\xff\xff\xffstatusResponse\n"),
badRconIdentifier: []byte("Bad rcon"), getinfoResponseHeader: []byte("\xff\xff\xff\xffinfoResponse\n"),
badRconIdentifier: []byte("Bad rcon"),
} }
} }
func (v *validator) isRconRequestPacket(buf []byte) bool { func (v validator) compare(buf, c []byte) bool {
return bytes.Equal(buf[:len(v.rconRequestHeader)], v.rconRequestHeader) return bytes.Equal(buf[:len(c)], c)
} }
func (v *validator) isQueryRequestPacket(buf []byte) bool { func (v validator) isRconRequestPacket(buf []byte) bool {
return bytes.Equal(buf[:len(v.getstatusRequestHeader)], v.getstatusRequestHeader) || bytes.Equal(buf[:len(v.getinfoRequestHeader)], v.getinfoRequestHeader) return v.compare(buf, v.rconRequestHeader)
} }
func (v *validator) isValidRequestPacket(buf []byte) bool { func (v validator) isQueryRequestPacket(buf []byte) bool {
return v.compare(buf, v.getstatusRequestHeader) ||
v.compare(buf, v.getinfoRequestHeader)
}
func (v validator) isValidRequestPacket(buf []byte) bool {
return v.isRconRequestPacket(buf) || v.isQueryRequestPacket(buf) return v.isRconRequestPacket(buf) || v.isQueryRequestPacket(buf)
} }
func (v *validator) isRconResponsePacket(buf []byte) bool { func (v validator) isChallengeRequestPacket(buf []byte) bool {
return bytes.Equal(buf[:len(v.rconResponseHeader)], v.rconResponseHeader) return v.compare(buf, v.getchallengeRequestHeader)
} }
func (v *validator) isQueryResponsePacket(buf []byte) bool { func (v validator) isRconResponsePacket(buf []byte) bool {
return bytes.Equal(buf[:len(v.getstatusResponseHeader)], v.getstatusResponseHeader) || bytes.Equal(buf[:len(v.getinfoResponseHeader)], v.getinfoResponseHeader) return v.compare(buf, v.rconResponseHeader)
} }
func (v *validator) isValidResponsePacket(buf []byte) bool { func (v validator) isQueryResponsePacket(buf []byte) bool {
return v.compare(buf, v.getstatusResponseHeader) ||
v.compare(buf, v.getinfoResponseHeader)
}
func (v validator) isValidResponsePacket(buf []byte) bool {
return v.isRconResponsePacket(buf) || v.isQueryResponsePacket(buf) return v.isRconResponsePacket(buf) || v.isQueryResponsePacket(buf)
} }
func (v *validator) isBadRconResponse(buf []byte) bool { func (v validator) isBadRconResponse(buf []byte) bool {
return bytes.Equal(buf[len(v.rconResponseHeader):len(v.rconResponseHeader)+len(v.badRconIdentifier)], v.badRconIdentifier) return v.compare(buf[len(v.rconResponseHeader):], v.badRconIdentifier)
} }