control.go 7.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318
  1. // Copyright 2017 fatedier, fatedier@gmail.com
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package client
  15. import (
  16. "crypto/tls"
  17. "fmt"
  18. "io"
  19. "runtime/debug"
  20. "sync"
  21. "time"
  22. "github.com/fatedier/frp/client/proxy"
  23. "github.com/fatedier/frp/g"
  24. "github.com/fatedier/frp/models/config"
  25. "github.com/fatedier/frp/models/msg"
  26. "github.com/fatedier/frp/utils/log"
  27. frpNet "github.com/fatedier/frp/utils/net"
  28. "github.com/fatedier/golib/control/shutdown"
  29. "github.com/fatedier/golib/crypto"
  30. fmux "github.com/hashicorp/yamux"
  31. )
  32. type Control struct {
  33. // uniq id got from frps, attach it in loginMsg
  34. runId string
  35. // manage all proxies
  36. pxyCfgs map[string]config.ProxyConf
  37. pm *proxy.ProxyManager
  38. // manage all visitors
  39. vm *VisitorManager
  40. // control connection
  41. conn frpNet.Conn
  42. // tcp stream multiplexing, if enabled
  43. session *fmux.Session
  44. // put a message in this channel to send it over control connection to server
  45. sendCh chan (msg.Message)
  46. // read from this channel to get the next message sent by server
  47. readCh chan (msg.Message)
  48. // goroutines can block by reading from this channel, it will be closed only in reader() when control connection is closed
  49. closedCh chan struct{}
  50. closedDoneCh chan struct{}
  51. // last time got the Pong message
  52. lastPong time.Time
  53. readerShutdown *shutdown.Shutdown
  54. writerShutdown *shutdown.Shutdown
  55. msgHandlerShutdown *shutdown.Shutdown
  56. mu sync.RWMutex
  57. log.Logger
  58. }
  59. func NewControl(runId string, conn frpNet.Conn, session *fmux.Session, pxyCfgs map[string]config.ProxyConf, visitorCfgs map[string]config.VisitorConf) *Control {
  60. ctl := &Control{
  61. runId: runId,
  62. conn: conn,
  63. session: session,
  64. pxyCfgs: pxyCfgs,
  65. sendCh: make(chan msg.Message, 100),
  66. readCh: make(chan msg.Message, 100),
  67. closedCh: make(chan struct{}),
  68. closedDoneCh: make(chan struct{}),
  69. readerShutdown: shutdown.New(),
  70. writerShutdown: shutdown.New(),
  71. msgHandlerShutdown: shutdown.New(),
  72. Logger: log.NewPrefixLogger(""),
  73. }
  74. ctl.pm = proxy.NewProxyManager(ctl.sendCh, runId)
  75. ctl.vm = NewVisitorManager(ctl)
  76. ctl.vm.Reload(visitorCfgs)
  77. return ctl
  78. }
  79. func (ctl *Control) Run() {
  80. go ctl.worker()
  81. // start all proxies
  82. ctl.pm.Reload(ctl.pxyCfgs)
  83. // start all visitors
  84. go ctl.vm.Run()
  85. return
  86. }
  87. func (ctl *Control) HandleReqWorkConn(inMsg *msg.ReqWorkConn) {
  88. workConn, err := ctl.connectServer()
  89. if err != nil {
  90. return
  91. }
  92. m := &msg.NewWorkConn{
  93. RunId: ctl.runId,
  94. }
  95. if err = msg.WriteMsg(workConn, m); err != nil {
  96. ctl.Warn("work connection write to server error: %v", err)
  97. workConn.Close()
  98. return
  99. }
  100. var startMsg msg.StartWorkConn
  101. if err = msg.ReadMsgInto(workConn, &startMsg); err != nil {
  102. ctl.Error("work connection closed, %v", err)
  103. workConn.Close()
  104. return
  105. }
  106. workConn.AddLogPrefix(startMsg.ProxyName)
  107. // dispatch this work connection to related proxy
  108. ctl.pm.HandleWorkConn(startMsg.ProxyName, workConn, &startMsg)
  109. }
  110. func (ctl *Control) HandleNewProxyResp(inMsg *msg.NewProxyResp) {
  111. // Server will return NewProxyResp message to each NewProxy message.
  112. // Start a new proxy handler if no error got
  113. err := ctl.pm.StartProxy(inMsg.ProxyName, inMsg.RemoteAddr, inMsg.Error)
  114. if err != nil {
  115. ctl.Warn("[%s] start error: %v", inMsg.ProxyName, err)
  116. } else {
  117. ctl.Info("[%s] start proxy success", inMsg.ProxyName)
  118. }
  119. }
  120. func (ctl *Control) Close() error {
  121. ctl.pm.Close()
  122. ctl.conn.Close()
  123. if ctl.session != nil {
  124. ctl.session.Close()
  125. }
  126. return nil
  127. }
  128. // ClosedDoneCh returns a channel which will be closed after all resources are released
  129. func (ctl *Control) ClosedDoneCh() <-chan struct{} {
  130. return ctl.closedDoneCh
  131. }
  132. // connectServer return a new connection to frps
  133. func (ctl *Control) connectServer() (conn frpNet.Conn, err error) {
  134. if g.GlbClientCfg.TcpMux {
  135. stream, errRet := ctl.session.OpenStream()
  136. if errRet != nil {
  137. err = errRet
  138. ctl.Warn("start new connection to server error: %v", err)
  139. return
  140. }
  141. conn = frpNet.WrapConn(stream)
  142. } else {
  143. var tlsConfig *tls.Config
  144. if g.GlbClientCfg.TLSEnable {
  145. tlsConfig = &tls.Config{
  146. InsecureSkipVerify: true,
  147. }
  148. }
  149. conn, err = frpNet.ConnectServerByProxyWithTLS(g.GlbClientCfg.HttpProxy, g.GlbClientCfg.Protocol,
  150. fmt.Sprintf("%s:%d", g.GlbClientCfg.ServerAddr, g.GlbClientCfg.ServerPort), tlsConfig)
  151. if err != nil {
  152. ctl.Warn("start new connection to server error: %v", err)
  153. return
  154. }
  155. }
  156. return
  157. }
  158. // reader read all messages from frps and send to readCh
  159. func (ctl *Control) reader() {
  160. defer func() {
  161. if err := recover(); err != nil {
  162. ctl.Error("panic error: %v", err)
  163. ctl.Error(string(debug.Stack()))
  164. }
  165. }()
  166. defer ctl.readerShutdown.Done()
  167. defer close(ctl.closedCh)
  168. encReader := crypto.NewReader(ctl.conn, []byte(g.GlbClientCfg.Token))
  169. for {
  170. if m, err := msg.ReadMsg(encReader); err != nil {
  171. if err == io.EOF {
  172. ctl.Debug("read from control connection EOF")
  173. return
  174. } else {
  175. ctl.Warn("read error: %v", err)
  176. ctl.conn.Close()
  177. return
  178. }
  179. } else {
  180. ctl.readCh <- m
  181. }
  182. }
  183. }
  184. // writer writes messages got from sendCh to frps
  185. func (ctl *Control) writer() {
  186. defer ctl.writerShutdown.Done()
  187. encWriter, err := crypto.NewWriter(ctl.conn, []byte(g.GlbClientCfg.Token))
  188. if err != nil {
  189. ctl.conn.Error("crypto new writer error: %v", err)
  190. ctl.conn.Close()
  191. return
  192. }
  193. for {
  194. if m, ok := <-ctl.sendCh; !ok {
  195. ctl.Info("control writer is closing")
  196. return
  197. } else {
  198. if err := msg.WriteMsg(encWriter, m); err != nil {
  199. ctl.Warn("write message to control connection error: %v", err)
  200. return
  201. }
  202. }
  203. }
  204. }
  205. // msgHandler handles all channel events and do corresponding operations.
  206. func (ctl *Control) msgHandler() {
  207. defer func() {
  208. if err := recover(); err != nil {
  209. ctl.Error("panic error: %v", err)
  210. ctl.Error(string(debug.Stack()))
  211. }
  212. }()
  213. defer ctl.msgHandlerShutdown.Done()
  214. hbSend := time.NewTicker(time.Duration(g.GlbClientCfg.HeartBeatInterval) * time.Second)
  215. defer hbSend.Stop()
  216. hbCheck := time.NewTicker(time.Second)
  217. defer hbCheck.Stop()
  218. ctl.lastPong = time.Now()
  219. for {
  220. select {
  221. case <-hbSend.C:
  222. // send heartbeat to server
  223. ctl.Debug("send heartbeat to server")
  224. ctl.sendCh <- &msg.Ping{}
  225. case <-hbCheck.C:
  226. if time.Since(ctl.lastPong) > time.Duration(g.GlbClientCfg.HeartBeatTimeout)*time.Second {
  227. ctl.Warn("heartbeat timeout")
  228. // let reader() stop
  229. ctl.conn.Close()
  230. return
  231. }
  232. case rawMsg, ok := <-ctl.readCh:
  233. if !ok {
  234. return
  235. }
  236. switch m := rawMsg.(type) {
  237. case *msg.ReqWorkConn:
  238. go ctl.HandleReqWorkConn(m)
  239. case *msg.NewProxyResp:
  240. ctl.HandleNewProxyResp(m)
  241. case *msg.Pong:
  242. ctl.lastPong = time.Now()
  243. ctl.Debug("receive heartbeat from server")
  244. }
  245. }
  246. }
  247. }
  248. // If controler is notified by closedCh, reader and writer and handler will exit
  249. func (ctl *Control) worker() {
  250. go ctl.msgHandler()
  251. go ctl.reader()
  252. go ctl.writer()
  253. select {
  254. case <-ctl.closedCh:
  255. // close related channels and wait until other goroutines done
  256. close(ctl.readCh)
  257. ctl.readerShutdown.WaitDone()
  258. ctl.msgHandlerShutdown.WaitDone()
  259. close(ctl.sendCh)
  260. ctl.writerShutdown.WaitDone()
  261. ctl.pm.Close()
  262. ctl.vm.Close()
  263. close(ctl.closedDoneCh)
  264. if ctl.session != nil {
  265. ctl.session.Close()
  266. }
  267. return
  268. }
  269. }
  270. func (ctl *Control) ReloadConf(pxyCfgs map[string]config.ProxyConf, visitorCfgs map[string]config.VisitorConf) error {
  271. ctl.vm.Reload(visitorCfgs)
  272. ctl.pm.Reload(pxyCfgs)
  273. return nil
  274. }