forked from yaoweibin/nginx_tcp_proxy_module
-
Notifications
You must be signed in to change notification settings - Fork 0
/
README
757 lines (480 loc) · 20 KB
/
README
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
Name
nginx_tcp_proxy_module - support TCP proxy with Nginx
Installation
Download the latest stable version of the release tarball of this module
from github (<http://github.com/yaoweibin/nginx_tcp_proxy_module>)
Grab the nginx source code from nginx.org (<http://nginx.org/>), for
example, the version 1.2.1 (see nginx compatibility), and then build the
source with this module:
$ wget 'http://nginx.org/download/nginx-1.2.1.tar.gz'
$ tar -xzvf nginx-1.2.1.tar.gz
$ cd nginx-1.2.1/
$ patch -p1 < /path/to/nginx_tcp_proxy_module/tcp.patch
$ ./configure --add-module=/path/to/nginx_tcp_proxy_module
$ make
$ make install
Synopsis
http {
server {
listen 80;
location /status {
tcp_check_status;
}
}
}
#You can also include tcp_proxy.conf file individually
#include /path/to/tcp_proxy.conf;
tcp {
upstream cluster {
# simple round-robin
server 192.168.0.1:80;
server 192.168.0.2:80;
check interval=3000 rise=2 fall=5 timeout=1000;
#check interval=3000 rise=2 fall=5 timeout=1000 type=ssl_hello;
#check interval=3000 rise=2 fall=5 timeout=1000 type=http;
#check_http_send "GET / HTTP/1.0\r\n\r\n";
#check_http_expect_alive http_2xx http_3xx;
}
server {
listen 8888;
proxy_pass cluster;
}
}
Description
This module actually include many modules: ngx_tcp_module,
ngx_tcp_core_module, ngx_tcp_upstream_module, ngx_tcp_proxy_module,
ngx_tcp_websocket_module, ngx_tcp_ssl_module,
ngx_tcp_upstream_ip_hash_module. All these modules work together to
support TCP proxy with Nginx. I also added other features: ip_hash,
upstream server health check, status monitor.
The motivation of writing these modules is Nginx's high performance and
robustness. At first, I developed this module just for general TCP
proxy. And now, this module is frequently used in websocket reverse
proxying.
Note, You can't use the same listening port with HTTP modules.
Directives
ngx_tcp_moodule
tcp
syntax: *tcp {...}*
default: *none*
context: *main*
description: All the tcp related directives are contained in the tcp
block.
ngx_tcp_core_moodule
server
syntax: *server {...}*
default: *none*
context: *tcp*
description: All the specific server directives are contained in the
server block.
listen
syntax: *listen address:port [ bind | ssl | default]*
default: *none*
context: *server*
description: The same as listen
(<http://wiki.nginx.org/NginxMailCoreModule#listen>). The parameter of
default means the default server if you have several server blocks with
the same port.
access_log
syntax: *access_log path [buffer=size] | off*
default: *access_log logs/tcp_access.log*
context: *tcp, server*
description: Set the access.log. Each record's format is like this:
log_time worker_process_pid client_ip host_ip accept_time upstream_ip
bytes_read bytes_write
2011/08/02 06:19:07 [5972] 127.0.0.1 0.0.0.0:1982 2011/08/02 06:18:19
172.19.0.129:80 80 236305
* *log_time*: The current time when writing this log. The log action
is called when the proxy session is closed.
* *worker_process_pid*: the pid of worker process
* *client_ip*: the client ip
* *host_ip*: the server ip and port
* *accept_time*: the time when the server accepts client's connection
* *upstream_ip*: the upstream server's ip
* *bytes_read*: the bytes read from client
* *bytes_write*: the bytes written to client
allow
syntax: *allow [ address | CIDR | all ]*
default: *none*
context: *server*
description: Directive grants access for the network or addresses
indicated.
deny
syntax: *deny [ address | CIDR | all ]*
default: *none*
context: *server*
description: Directive grants access for the network or addresses
indicated.
so_keepalive
syntax: *so_keepalive on|off*
default: *off*
context: *main, server*
description: The same as so_keepalive
(<http://wiki.nginx.org/NginxMailCoreModule#so_keepalive>).
tcp_nodelay
syntax: *tcp_nodelay on|off*
default: *on*
context: *main, server*
description: The same as tcp_nodelay
(<http://wiki.nginx.org/NginxHttpCoreModule#tcp_nodelay>).
timeout
syntax: *timeout milliseconds*
default: *60000*
context: *main, server*
description: set the timeout value with clients.
server_name
syntax: *server_name name*
default: *The name of the host, obtained through gethostname()*
context: *tcp, server*
description: The same as server_name
(<http://wiki.nginx.org/NginxMailCoreModule#server_name>). You can
specify several server name in different server block with the same
port. They can be used in websocket module.
resolver
syntax: *resolver address*
default: *none*
context: *tcp, server*
description: DNS server
resolver_timeout
syntax: *resolver_timeout time*
default: *30s*
context: *tcp, server*
description: Resolver timeout in seconds.
ngx_tcp_upstream_module
upstream
syntax: *upstream {...}*
default: *none*
context: *tcp*
description: All the upstream directives are contained in this block.
The upstream server will be dispatched with round robin by default.
server
syntax: *server name [parameters]*
default: *none*
context: *upstream*
description: Most of the parameters are the same as server
(<http://wiki.nginx.org/NginxHttpUpstreamModule#server>). Default port
is 80.
check
syntax: *check interval=milliseconds [fall=count] [rise=count]
[timeout=milliseconds] [type=tcp|ssl_hello|smtp|mysql|pop3|imap]*
default: *none, if parameters omitted, default parameters are
interval=30000 fall=5 rise=2 timeout=1000*
context: *upstream*
description: Add the health check for the upstream servers. At present,
the check method is a simple tcp connect.
The parameters' meanings are:
* *interval*: the check request's interval time.
* *fall*(fall_count): After fall_count check failures, the server is
marked down.
* *rise*(rise_count): After rise_count check success, the server is
marked up.
* *timeout*: the check request's timeout.
* *type*: the check protocol type:
1. *tcp* is a simple tcp socket connect and peek one byte.
2. *ssl_hello* sends a client ssl hello packet and receives the
server ssl hello packet.
3. *http* sends a http request packet, receives and parses the http
response to diagnose if the upstream server is alive.
4. *smtp* sends a smtp request packet, receives and parses the smtp
response to diagnose if the upstream server is alive. The
response begins with '2' should be an OK response.
5. *mysql* connects to the mysql server, receives the greeting
response to diagnose if the upstream server is alive.
6. *pop3* receives and parses the pop3 response to diagnose if the
upstream server is alive. The response begins with '+' should be
an OK response.
7. *imap* connects to the imap server, receives the greeting
response to diagnose if the upstream server is alive.
check_http_send
syntax: *check_http_send http_packet*
default: *"GET / HTTP/1.0\r\n\r\n"*
context: *upstream*
description: If you set the check type is http, then the check function
will sends this http packet to check the upstream server.
check_http_expect_alive
syntax: *check_http_expect_alive [ http_2xx | http_3xx | http_4xx |
http_5xx ]*
default: *http_2xx | http_3xx*
context: *upstream*
description: These status codes indicate the upstream server's http
response is OK, the backend is alive.
check_smtp_send
syntax: *check_smtp_send smtp_packet*
default: *"HELO smtp.localdomain\r\n"*
context: *upstream*
description: If you set the check type is smtp, then the check function
will sends this smtp packet to check the upstream server.
check_smtp_expect_alive
syntax: *check_smtp_expect_alive [smtp_2xx | smtp_3xx | smtp_4xx |
smtp_5xx]*
default: *smtp_2xx*
context: *upstream*
description: These status codes indicate the upstream server's smtp
response is OK, the backend is alive.
check_shm_size
syntax: *check_shm_size size*
default: *(number_of_checked_upstream_blocks + 1) * pagesize*
context: *tcp*
description: If you store hundreds of servers in one upstream block, the
shared memory for health check may be not enough, you can enlarged it by
this directive.
tcp_check_status
syntax: *tcp_check_status*
default: *none*
context: *location*
description: Display the health checking servers' status by HTTP. This
directive is set in the http block.
The table field meanings are:
* *Index*: The server index in the check table
* *Name* : The upstream server name
* *Status*: The marked status of the server.
* *Busyness*: The number of connections which are connecting to the
server.
* *Rise counts*: Count the successful checking
* *Fall counts*: Count the unsuccessful checking
* *Access counts*: Count the times accessing to this server
* *Check type*: The type of the check packet
ngx_tcp_upstream_busyness_module
busyness
syntax: *busyness*
default: *none*
context: *upstream*
description: the upstream server will be dispatched by backend servers'
busyness.
ngx_tcp_upstream_ip_hash_module
ip_hash
syntax: *ip_hash*
default: *none*
context: *upstream*
description: the upstream server will be dispatched by ip_hash.
ngx_tcp_proxy_module
proxy_pass
syntax: *proxy_pass host:port*
default: *none*
context: *server*
description: proxy the request to the backend server. Default port is
80.
proxy_buffer
syntax: *proxy_buffer size*
default: *4k*
context: *tcp, server*
description: set the size of proxy buffer.
proxy_connect_timeout
syntax: *proxy_connect_timeout miliseconds*
default: *60000*
context: *tcp, server*
description: set the timeout value of connection to backends.
proxy_read_timeout
syntax: *proxy_read_timeout miliseconds*
default: *60000*
context: *tcp, server*
description: set the timeout value of reading from backends.
proxy_send_timeout
syntax: *proxy_send_timeout miliseconds*
default: *60000*
context: *tcp, server*
description: set the timeout value of sending to backends.
ngx_tcp_websocket_module
websocket_pass
syntax: *websocket_pass [path] host:port*
default: *none*
context: *server*
description: proxy the websocket request to the backend server. Default
port is 80. You can specify several different paths in the same server
block.
websocket_buffer
syntax: *websocket_buffer size*
default: *4k*
context: *tcp, server*
description: set the size of proxy buffer.
websocket_connect_timeout
syntax: *websocket_connect_timeout miliseconds*
default: *60000*
context: *tcp, server*
description: set the timeout value of connection to backends.
websocket_read_timeout
syntax: *websocket_read_timeout miliseconds*
default: *60000*
context: *tcp, server*
description: set the timeout value of reading from backends. Your
timeout will be the minimum of this and the *timeout* parameter, so if
you want a long timeout for your websockets, make sure to set both
paramaters.
websocket_send_timeout
syntax: *websocket_send_timeout miliseconds*
default: *60000*
context: *tcp, server*
description: set the timeout value of sending to backends.
ngx_tcp_ssl_module
The default config file includes this ngx_tcp_ssl_module. If you want to
just compile nginx without ngx_tcp_ssl_module, copy the
ngx_tcp_proxy_module/config_without_ssl to ngx_tcp_proxy_module/config,
reconfigrure and compile nginx.
ssl
syntax: *ssl [on|off] *
default: *ssl off*
context: *tcp, server*
Enables SSL for a server.
ssl_certificate
syntax: *ssl_certificate file*
default: *ssl_certificate cert.pem*
context: *tcp, server*
This directive specifies the file containing the certificate, in PEM
format. This file can contain also other certificates and the server
private key.
ssl_certificate_key
syntax: *ssl_certificate_key file*
default: *ssl_certificate_key cert.pem*
context: *tcp, server*
This directive specifies the file containing the private key, in PEM
format.
ssl_client_certificate
syntax: *ssl_client_certificate file*
default: *none*
context: *tcp, server*
This directive specifies the file containing the CA (root) certificate,
in PEM format, that is used for validating client certificates.
ssl_dhparam
syntax: *ssl_dhparam file*
default: *none*
context: *tcp, server*
This directive specifies a file containing Diffie-Hellman key agreement
protocol cryptographic parameters, in PEM format, utilized for
exchanging session keys between server and client.
ssl_ciphers
syntax: *ssl_ciphers openssl_cipherlist_spec*
default: *ssl_ciphers HIGH:!aNULL:!MD5*
context: *tcp, server*
This directive describes the list of cipher suites the server supports
for establishing a secure connection. Cipher suites are specified in the
OpenSSL (<http://openssl.org/docs/apps/ciphers.html>) cipherlist format,
for example:
ssl_ciphers ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP;
The complete cipherlist supported by the currently installed version of
OpenSSL in your platform can be obtained by issuing the command: openssl
ciphers
ssl_crl
syntax: *ssl_crl file*
default: *none*
context: *tcp, server*
This directive specifies the filename of a Certificate Revocation List,
in PEM format, which is used to check the revocation status of
certificates.
ssl_prefer_server_ciphers
syntax: *ssl_prefer_server_ciphers [on|off] *
default: *ssl_prefer_server_ciphers off*
context: *tcp, server*
The server requires that the cipher suite list for protocols SSLv3 and
TLSv1 are to be preferred over the client supported cipher suite list.
ssl_protocols
syntax: *ssl_protocols [SSLv2] [SSLv3] [TLSv1] [TLSv1.1] [TLSv1.2]*
default: *ssl_protocols SSLv3 TLSv1 TLSv1.1 TLSv1.2*
context: *tcp, server*
This directive enables the protocol versions specified.
ssl_verify_client
syntax: *ssl_verify_client on|off|optional*
default: *ssl_verify_client off*
context: *tcp, server*
This directive enables the verification of the client identity.
Parameter 'optional' checks the client identity using its certificate in
case it was made available to the server.
ssl_verify_depth
syntax: *ssl_verify_depth number*
default: *ssl_verify_depth 1*
context: *tcp, server*
This directive sets how deep the server should go in the client provided
certificate chain in order to verify the client identity.
ssl_session_cache
syntax: *ssl_session_cache off|none|builtin:size and/or
shared:name:size*
default: *ssl_session_cache off*
context: *tcp, server*
The directive sets the types and sizes of caches to store the SSL
sessions.
The cache types are:
* off -- Hard off: nginx says explicitly to a client that sessions can
not reused.
* none -- Soft off: nginx says to a client that session can be resued,
but nginx actually never reuses them. This is workaround for some
mail clients as ssl_session_cache may be used in mail proxy as well
as in HTTP server.
* builtin -- the OpenSSL builtin cache, is used inside one worker
process only. The cache size is assigned in the number of the
sessions. Note: there appears to be a memory fragmentation issue
using this method, please take that into consideration when using
this. See "References" below.
* shared -- the cache is shared between all worker processes. The size
of the cache is assigned in bytes: 1 MB cache can contain roughly
4000 sessions. Each shared cache must be given an arbitrary name. A
shared cache with a given name can be used in several virtual hosts.
It's possible to use both types of cache — builtin and shared
— simultaneously, for example:
ssl_session_cache builtin:1000 shared:SSL:10m;
Bear in mind however, that using only shared cache, i.e., without
builtin, should be more effective.
ssl_session_timeout
syntax: *ssl_session_timeout time*
default: *ssl_session_timeout 5m*
context: *tcp, server*
This directive defines the maximum time during which the client can
re-use the previously negotiated cryptographic parameters of the secure
session that is stored in the SSL cache.
Compatibility
* My test bed is 0.7.65+
Notes
The http_response_parse.rl and smtp_response_parse.rl are ragel
(<http://www.complang.org/ragel/>) scripts , you can edit the script and
compile it like this:
$ ragel -G2 http_response_parse.rl
$ ragel -G2 smtp_response_parse.rl
TODO
* refact this module, make it more extendable for adding third-party
modules
* manipulate header like http module's proxy_set_header
* built-in variable support
* custom log format
* syslog support
* FTP/IRC proxying
Known Issues
* This module can't use the same listening port with the HTTP module.
Changelogs
v0.2.0
* add ssl proxy module
* add websocket proxy module
* add upstream busyness module
* add tcp access log module
v0.19
* add many check methods
v0.1
* first release
Authors
Weibin Yao(姚伟斌) *yaoweibin at gmail dot com*
Copyright & License
This README template copy from agentzh (<http://github.com/agentzh>).
I borrowed a lot of code from upstream and mail module from the nginx
0.7.* core. This part of code is copyrighted by Igor Sysoev. And the
health check part is borrowed the design of Jack Lindamood's healthcheck
module healthcheck_nginx_upstreams
(<http://github.com/cep21/healthcheck_nginx_upstreams>);
This module is licensed under the BSD license.
Copyright (C) 2013 by Weibin Yao <yaoweibin@gmail.com>.
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
* Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.