|
@@ -0,0 +1,202 @@
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+
|
|
|
+package msg
|
|
|
+
|
|
|
+import (
|
|
|
+ "bufio"
|
|
|
+ "bytes"
|
|
|
+ "encoding/binary"
|
|
|
+ "fmt"
|
|
|
+ "io"
|
|
|
+ "net"
|
|
|
+ "sync"
|
|
|
+
|
|
|
+ "frp/models/config"
|
|
|
+ "frp/utils/conn"
|
|
|
+ "frp/utils/log"
|
|
|
+ "frp/utils/pcrypto"
|
|
|
+)
|
|
|
+
|
|
|
+
|
|
|
+func Join(c1 *conn.Conn, c2 *conn.Conn) {
|
|
|
+ var wait sync.WaitGroup
|
|
|
+ pipe := func(to *conn.Conn, from *conn.Conn) {
|
|
|
+ defer to.Close()
|
|
|
+ defer from.Close()
|
|
|
+ defer wait.Done()
|
|
|
+
|
|
|
+ var err error
|
|
|
+ _, err = io.Copy(to.TcpConn, from.TcpConn)
|
|
|
+ if err != nil {
|
|
|
+ log.Warn("join connections error, %v", err)
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ wait.Add(2)
|
|
|
+ go pipe(c1, c2)
|
|
|
+ go pipe(c2, c1)
|
|
|
+ wait.Wait()
|
|
|
+ return
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+func JoinMore(c1 *conn.Conn, c2 *conn.Conn, conf config.BaseConf) {
|
|
|
+ var wait sync.WaitGroup
|
|
|
+ encryptPipe := func(from *conn.Conn, to *conn.Conn) {
|
|
|
+ defer from.Close()
|
|
|
+ defer to.Close()
|
|
|
+ defer wait.Done()
|
|
|
+
|
|
|
+
|
|
|
+ pipeEncrypt(from.TcpConn, to.TcpConn, conf)
|
|
|
+ }
|
|
|
+
|
|
|
+ decryptPipe := func(to *conn.Conn, from *conn.Conn) {
|
|
|
+ defer from.Close()
|
|
|
+ defer to.Close()
|
|
|
+ defer wait.Done()
|
|
|
+
|
|
|
+
|
|
|
+ pipeDecrypt(to.TcpConn, from.TcpConn, conf)
|
|
|
+ }
|
|
|
+
|
|
|
+ wait.Add(2)
|
|
|
+ go encryptPipe(c1, c2)
|
|
|
+ go decryptPipe(c2, c1)
|
|
|
+ wait.Wait()
|
|
|
+ log.Debug("ProxyName [%s], One tunnel stopped", conf.Name)
|
|
|
+ return
|
|
|
+}
|
|
|
+
|
|
|
+func pkgMsg(data []byte) []byte {
|
|
|
+ llen := uint32(len(data))
|
|
|
+ buf := new(bytes.Buffer)
|
|
|
+ binary.Write(buf, binary.BigEndian, llen)
|
|
|
+ buf.Write(data)
|
|
|
+ return buf.Bytes()
|
|
|
+}
|
|
|
+
|
|
|
+func unpkgMsg(data []byte) (int, []byte, []byte) {
|
|
|
+ if len(data) < 4 {
|
|
|
+ return -1, nil, data
|
|
|
+ }
|
|
|
+ llen := int(binary.BigEndian.Uint32(data[0:4]))
|
|
|
+
|
|
|
+ if len(data) < llen+4 {
|
|
|
+ return -1, nil, data
|
|
|
+ }
|
|
|
+
|
|
|
+ return 0, data[4 : llen+4], data[llen+4:]
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+func pipeDecrypt(r net.Conn, w net.Conn, conf config.BaseConf) (err error) {
|
|
|
+ laes := new(pcrypto.Pcrypto)
|
|
|
+ if err := laes.Init([]byte(conf.AuthToken)); err != nil {
|
|
|
+ log.Warn("ProxyName [%s], Pcrypto Init error: %v", conf.Name, err)
|
|
|
+ return fmt.Errorf("Pcrypto Init error: %v", err)
|
|
|
+ }
|
|
|
+
|
|
|
+ buf := make([]byte, 5*1024+4)
|
|
|
+ var left, res []byte
|
|
|
+ var cnt int
|
|
|
+ nreader := bufio.NewReader(r)
|
|
|
+ for {
|
|
|
+
|
|
|
+
|
|
|
+ var newBuf []byte
|
|
|
+ if cnt < 0 {
|
|
|
+ n, err := nreader.Read(buf)
|
|
|
+ if err != nil {
|
|
|
+ return err
|
|
|
+ }
|
|
|
+ newBuf = append(left, buf[0:n]...)
|
|
|
+ } else {
|
|
|
+ newBuf = left
|
|
|
+ }
|
|
|
+ cnt, res, left = unpkgMsg(newBuf)
|
|
|
+ if cnt < 0 {
|
|
|
+ continue
|
|
|
+ }
|
|
|
+
|
|
|
+
|
|
|
+ if conf.UseEncryption {
|
|
|
+ res, err = laes.Decrypt(res)
|
|
|
+ if err != nil {
|
|
|
+ log.Warn("ProxyName [%s], decrypt error, %v", conf.Name, err)
|
|
|
+ return fmt.Errorf("Decrypt error: %v", err)
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ if conf.UseGzip {
|
|
|
+ log.Warn("%x", res)
|
|
|
+ res, err = laes.Decompression(res)
|
|
|
+ if err != nil {
|
|
|
+ log.Warn("ProxyName [%s], decompression error, %v", conf.Name, err)
|
|
|
+ return fmt.Errorf("Decompression error: %v", err)
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ _, err = w.Write(res)
|
|
|
+ if err != nil {
|
|
|
+ return err
|
|
|
+ }
|
|
|
+ }
|
|
|
+ return nil
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+func pipeEncrypt(r net.Conn, w net.Conn, conf config.BaseConf) (err error) {
|
|
|
+ laes := new(pcrypto.Pcrypto)
|
|
|
+ if err := laes.Init([]byte(conf.AuthToken)); err != nil {
|
|
|
+ log.Warn("ProxyName [%s], Pcrypto Init error: %v", conf.Name, err)
|
|
|
+ return fmt.Errorf("Pcrypto Init error: %v", err)
|
|
|
+ }
|
|
|
+
|
|
|
+ nreader := bufio.NewReader(r)
|
|
|
+ buf := make([]byte, 5*1024)
|
|
|
+ for {
|
|
|
+ n, err := nreader.Read(buf)
|
|
|
+ if err != nil {
|
|
|
+ return err
|
|
|
+ }
|
|
|
+
|
|
|
+ res := buf[0:n]
|
|
|
+
|
|
|
+ if conf.UseGzip {
|
|
|
+ res, err = laes.Compression(res)
|
|
|
+ if err != nil {
|
|
|
+ log.Warn("ProxyName [%s], compression error: %v", conf.Name, err)
|
|
|
+ return fmt.Errorf("Compression error: %v", err)
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ if conf.UseEncryption {
|
|
|
+ res, err = laes.Encrypt(res)
|
|
|
+ if err != nil {
|
|
|
+ log.Warn("ProxyName [%s], encrypt error: %v", conf.Name, err)
|
|
|
+ return fmt.Errorf("Encrypt error: %v", err)
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ res = pkgMsg(res)
|
|
|
+ _, err = w.Write(res)
|
|
|
+ if err != nil {
|
|
|
+ return err
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ return nil
|
|
|
+}
|