-
-
Save real420og/50005396d7412f88d9bcea24f94db090 to your computer and use it in GitHub Desktop.
SSH tunnelling in Golang
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| package main | |
| import ( | |
| "log" | |
| "bufio" | |
| "time" | |
| "os" | |
| "fmt" | |
| "io" | |
| "net" | |
| "golang.org/x/crypto/ssh" | |
| "golang.org/x/crypto/ssh/agent" | |
| ) | |
| type Endpoint struct { | |
| Host string | |
| Port int | |
| } | |
| func (endpoint *Endpoint) String() string { | |
| return fmt.Sprintf("%s:%d", endpoint.Host, endpoint.Port) | |
| } | |
| type SSHtunnel struct { | |
| Local *Endpoint | |
| Server *Endpoint | |
| Remote *Endpoint | |
| Config *ssh.ClientConfig | |
| } | |
| func (tunnel *SSHtunnel) Start() error { | |
| listener, err := net.Listen("tcp", tunnel.Local.String()) | |
| if err != nil { | |
| return err | |
| } | |
| defer listener.Close() | |
| for { | |
| conn, err := listener.Accept() | |
| if err != nil { | |
| return err | |
| } | |
| go tunnel.forward(conn) | |
| } | |
| } | |
| func (tunnel *SSHtunnel) forward(localConn net.Conn) { | |
| serverConn, err := ssh.Dial("tcp", tunnel.Server.String(), tunnel.Config) | |
| if err != nil { | |
| fmt.Printf("Server dial error: %s\n", err) | |
| return | |
| } | |
| remoteConn, err := serverConn.Dial("tcp", tunnel.Remote.String()) | |
| if err != nil { | |
| fmt.Printf("Remote dial error: %s\n", err) | |
| return | |
| } | |
| copyConn:=func(writer, reader net.Conn) { | |
| defer writer.Close() | |
| defer reader.Close() | |
| _, err:= io.Copy(writer, reader) | |
| if err != nil { | |
| fmt.Printf("io.Copy error: %s", err) | |
| } | |
| } | |
| go copyConn(localConn, remoteConn) | |
| go copyConn(remoteConn, localConn) | |
| } | |
| func SSHAgent() ssh.AuthMethod { | |
| if sshAgent, err := net.Dial("unix", os.Getenv("SSH_AUTH_SOCK")); err == nil { | |
| return ssh.PublicKeysCallback(agent.NewClient(sshAgent).Signers) | |
| } | |
| return nil | |
| } | |
| func main() { | |
| localEndpoint := &Endpoint{ | |
| Host: "localhost", | |
| Port: 9000, | |
| } | |
| serverEndpoint := &Endpoint{ | |
| Host: "example.com", | |
| Port: 22, | |
| } | |
| remoteEndpoint := &Endpoint{ | |
| Host: "localhost", | |
| Port: 8080, | |
| } | |
| sshConfig := &ssh.ClientConfig{ | |
| User: "vcap", | |
| Auth: []ssh.AuthMethod{ | |
| SSHAgent(), | |
| }, | |
| } | |
| tunnel := &SSHtunnel{ | |
| Config: sshConfig, | |
| Local: localEndpoint, | |
| Server: serverEndpoint, | |
| Remote: remoteEndpoint, | |
| } | |
| tunnel.Start() | |
| } |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment