PipeGate is a lightweight, self-hosted proxy built with FastAPI, designed as a "poor man's ngrok." It allows you to expose your local servers to the internet, providing a simple way to create tunnels from your local machine to the external world.
- Features
- Prerequisites
- Installation
- Usage
- Configuration
- Security Considerations
- Contributing
- License
- Acknowledgements
- Contact
- FAQ
- Self-Hosted: Deploy PipeGate on your own infrastructure, giving you control over your setup.
- Unique Connections: Clients connect using unique UUIDs, ensuring each tunnel is distinct.
- Customizable: Modify and extend PipeGate to fit your specific needs.
- Lightweight: Minimal dependencies and straightforward setup make it easy to use.
- Educational: A great tool for learning how tunneling services operate internally.
Before you begin, ensure you have met the following requirements:
First, clone the PipeGate repository to your local machine:
git clone https://github.com/janbjorge/pipegate.git
cd pipegate
Install the required dependencies using uv
:
uv sync
You can also install PipeGate directly from GitHub using pip:
pip install git+https://github.com/janbjorge/pipegate.git
PipeGate uses JWT (JSON Web Tokens) for authenticating client connections. To establish a secure tunnel, you need to generate a JWT bearer token that includes a unique connection ID.
-
Generate the JWT Token:
Run the authentication helper script to generate a JWT bearer token and a corresponding connection ID.
python -m pipegate.auth
Output Example:
Connection-id: 123e4567-e89b-12d3-a456-426614174000 JWT Bearer: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...
- Connection-id: A unique UUID representing your tunnel connection.
- JWT Bearer: The JWT token you will use to authenticate your requests to the PipeGate server.
Optional: To customize the connection id, you can set the
PIPEGATE_CONNECTION_ID
environment variable when running theauth
script. This may be useful if your PipeGate server is hosting multiple tunnels for well-known endpoints or APIs.PIPEGATE_CONNECTION_ID=my-api python -m pipegate.auth
Output Example:
Connection-id: my-api JWT Bearer: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...
-
Store the Credentials:
Keep the
Connection-id
andJWT Bearer
token secure, as they are required to establish a connection between the server and client.
Deploy the PipeGate server on your infrastructure. By default, the server runs on http://0.0.0.0:8000
.
-
Configure the Server:
Ensure that the server is configured to use the same JWT secret and algorithms as used when generating the JWT token. You can modify the
Settings
in your server configuration as needed, typically found inserver.py
or your configuration files. -
Run the Server:
python -m pipegate.server
Optional: To customize the host and port, modify the
uvicorn.run
parameters inserver.py
or set environment variables if implemented.
Run the PipeGate client on your local machine to expose a local server.
python -m pipegate.client <TARGET_URL> <SERVER_URL>
Parameters:
TARGET_URL
: The local target (e.g.,http://127.0.0.1:9090
).SERVER_URL
: WebSocket URL of your PipeGate server, including the unique connection ID.
Example:
python -m pipegate.client http://127.0.0.1:9090 wss://yourserver.com/123e4567-e89b-12d3-a456-426614174000
-
Generate a JWT Bearer Token:
python -m pipegate.auth
Sample Output:
Connection-id: 123e4567-e89b-12d3-a456-426614174000 JWT Bearer: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...
-
Start the Server:
Ensure your server is configured with the appropriate JWT settings, then run:
python -m pipegate.server
-
Start the Client:
Use the generated
Connection-id
to start the client:python -m pipegate.client http://127.0.0.1:9090 wss://yourserver.com/123e4567-e89b-12d3-a456-426614174000
-
Expose Local Server:
Point your external webhooks or services to
https://yourserver.com/123e4567-e89b-12d3-a456-426614174000/path
, and PipeGate will forward the requests to your local server running on port9090
.
PipeGate is highly customizable. You can modify the server and client configurations to tailor the tool to your specific needs. Refer to the source code and documentation for detailed configuration options.
Possible Configuration Enhancements:
- Authentication: PipeGate uses JWT for authenticating client connections. Ensure that the JWT settings (
jwt_secret
,jwt_algorithms
) in both server and client are consistent. - Timeouts: Adjust request and connection timeouts based on your requirements.
- Logging: Configure logging levels and outputs to monitor activity.
Note: Future releases may include configuration files or environment variable support for easier customization.
PipeGate has minimal to no built-in security features beyond JWT authentication. It is essential to implement your own security measures to protect your infrastructure when using PipeGate. Consider the following:
- Authentication: Ensure that only authorized clients can connect to your PipeGate server by using strong JWT secrets and managing token distribution securely.
- Network Security: Utilize firewalls, VPNs, or other network security tools to restrict access to your PipeGate server.
- Input Validation: Apply thorough validation and filtering of incoming requests to prevent malicious activities.
- Encryption: Ensure that HTTPS is set up to encrypt data in transit, especially if transmitting sensitive information.
- Monitoring and Auditing: Regularly monitor and audit your PipeGate setup to detect and respond to potential threats.
- Resource Limiting: Implement rate limiting or throttling to prevent abuse and ensure fair usage of server resources.
Disclaimer: PipeGate is provided "as is" without any guarantees. Use it at your own risk.
Contributions are welcome! Whether you're fixing bugs, improving documentation, or adding new features, your help is appreciated.
-
Fork the Repository: Click the "Fork" button at the top right of the repository page.
-
Clone Your Fork:
git clone https://github.com/janbjorge/pipegate.git cd pipegate
-
Create a New Branch:
git checkout -b feature/YourFeatureName
-
Make Your Changes: Implement your feature or fix.
-
Commit Your Changes:
git commit -m "Add your message here"
-
Push to Your Fork:
git push origin feature/YourFeatureName
-
Open a Pull Request: Go to the original repository and create a pull request.
This project is licensed under the MIT License.
For any questions or suggestions, feel free to open an issue.
Q: How do I generate a unique connection ID?
A: You can use Python's uuid
module or any UUID generator to create a unique ID. Alternatively, use the provided authentication helper to generate a connection ID along with a JWT bearer token.
Q: Can I run multiple clients with the same server?
A: Yes, each client should use a unique connection ID and corresponding JWT bearer token to establish separate tunnels.
Q: How do I renew my JWT bearer token?
A: Generate a new JWT bearer token using the authentication helper script and update both the server and client configurations accordingly.
Q: What happens if my JWT token expires?
A: If the JWT token expires, the client will no longer be able to authenticate with the server. Generate a new token and restart the client with the updated token.