service.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486
  1. // Copyright 2017 fatedier, fatedier@gmail.com
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package client
  15. import (
  16. "context"
  17. "crypto/tls"
  18. "fmt"
  19. "io"
  20. "net"
  21. "runtime"
  22. "strconv"
  23. "strings"
  24. "sync"
  25. "sync/atomic"
  26. "time"
  27. "github.com/fatedier/golib/crypto"
  28. libdial "github.com/fatedier/golib/net/dial"
  29. fmux "github.com/hashicorp/yamux"
  30. quic "github.com/quic-go/quic-go"
  31. "github.com/fatedier/frp/assets"
  32. "github.com/fatedier/frp/pkg/auth"
  33. "github.com/fatedier/frp/pkg/config"
  34. "github.com/fatedier/frp/pkg/msg"
  35. "github.com/fatedier/frp/pkg/transport"
  36. "github.com/fatedier/frp/pkg/util/log"
  37. frpNet "github.com/fatedier/frp/pkg/util/net"
  38. "github.com/fatedier/frp/pkg/util/util"
  39. "github.com/fatedier/frp/pkg/util/version"
  40. "github.com/fatedier/frp/pkg/util/xlog"
  41. )
  42. func init() {
  43. crypto.DefaultSalt = "frp"
  44. }
  45. // Service is a client service.
  46. type Service struct {
  47. // uniq id got from frps, attach it in loginMsg
  48. runID string
  49. // manager control connection with server
  50. ctl *Control
  51. ctlMu sync.RWMutex
  52. // Sets authentication based on selected method
  53. authSetter auth.Setter
  54. cfg config.ClientCommonConf
  55. pxyCfgs map[string]config.ProxyConf
  56. visitorCfgs map[string]config.VisitorConf
  57. cfgMu sync.RWMutex
  58. // The configuration file used to initialize this client, or an empty
  59. // string if no configuration file was used.
  60. cfgFile string
  61. // This is configured by the login response from frps
  62. serverUDPPort int
  63. exit uint32 // 0 means not exit
  64. // service context
  65. ctx context.Context
  66. // call cancel to stop service
  67. cancel context.CancelFunc
  68. }
  69. func NewService(
  70. cfg config.ClientCommonConf,
  71. pxyCfgs map[string]config.ProxyConf,
  72. visitorCfgs map[string]config.VisitorConf,
  73. cfgFile string,
  74. ) (svr *Service, err error) {
  75. ctx, cancel := context.WithCancel(context.Background())
  76. svr = &Service{
  77. authSetter: auth.NewAuthSetter(cfg.ClientConfig),
  78. cfg: cfg,
  79. cfgFile: cfgFile,
  80. pxyCfgs: pxyCfgs,
  81. visitorCfgs: visitorCfgs,
  82. exit: 0,
  83. ctx: xlog.NewContext(ctx, xlog.New()),
  84. cancel: cancel,
  85. }
  86. return
  87. }
  88. func (svr *Service) GetController() *Control {
  89. svr.ctlMu.RLock()
  90. defer svr.ctlMu.RUnlock()
  91. return svr.ctl
  92. }
  93. func (svr *Service) Run() error {
  94. xl := xlog.FromContextSafe(svr.ctx)
  95. // set custom DNSServer
  96. if svr.cfg.DNSServer != "" {
  97. dnsAddr := svr.cfg.DNSServer
  98. if _, _, err := net.SplitHostPort(dnsAddr); err != nil {
  99. dnsAddr = net.JoinHostPort(dnsAddr, "53")
  100. }
  101. // Change default dns server for frpc
  102. net.DefaultResolver = &net.Resolver{
  103. PreferGo: true,
  104. Dial: func(ctx context.Context, network, address string) (net.Conn, error) {
  105. return net.Dial("udp", dnsAddr)
  106. },
  107. }
  108. }
  109. // login to frps
  110. for {
  111. conn, cm, err := svr.login()
  112. if err != nil {
  113. xl.Warn("login to server failed: %v", err)
  114. // if login_fail_exit is true, just exit this program
  115. // otherwise sleep a while and try again to connect to server
  116. if svr.cfg.LoginFailExit {
  117. return err
  118. }
  119. util.RandomSleep(10*time.Second, 0.9, 1.1)
  120. } else {
  121. // login success
  122. ctl := NewControl(svr.ctx, svr.runID, conn, cm, svr.cfg, svr.pxyCfgs, svr.visitorCfgs, svr.serverUDPPort, svr.authSetter)
  123. ctl.Run()
  124. svr.ctlMu.Lock()
  125. svr.ctl = ctl
  126. svr.ctlMu.Unlock()
  127. break
  128. }
  129. }
  130. go svr.keepControllerWorking()
  131. if svr.cfg.AdminPort != 0 {
  132. // Init admin server assets
  133. assets.Load(svr.cfg.AssetsDir)
  134. address := net.JoinHostPort(svr.cfg.AdminAddr, strconv.Itoa(svr.cfg.AdminPort))
  135. err := svr.RunAdminServer(address)
  136. if err != nil {
  137. log.Warn("run admin server error: %v", err)
  138. }
  139. log.Info("admin server listen on %s:%d", svr.cfg.AdminAddr, svr.cfg.AdminPort)
  140. }
  141. <-svr.ctx.Done()
  142. return nil
  143. }
  144. func (svr *Service) keepControllerWorking() {
  145. xl := xlog.FromContextSafe(svr.ctx)
  146. maxDelayTime := 20 * time.Second
  147. delayTime := time.Second
  148. // if frpc reconnect frps, we need to limit retry times in 1min
  149. // current retry logic is sleep 0s, 0s, 0s, 1s, 2s, 4s, 8s, ...
  150. // when exceed 1min, we will reset delay and counts
  151. cutoffTime := time.Now().Add(time.Minute)
  152. reconnectDelay := time.Second
  153. reconnectCounts := 1
  154. for {
  155. <-svr.ctl.ClosedDoneCh()
  156. if atomic.LoadUint32(&svr.exit) != 0 {
  157. return
  158. }
  159. // the first three retry with no delay
  160. if reconnectCounts > 3 {
  161. util.RandomSleep(reconnectDelay, 0.9, 1.1)
  162. xl.Info("wait %v to reconnect", reconnectDelay)
  163. reconnectDelay *= 2
  164. } else {
  165. util.RandomSleep(time.Second, 0, 0.5)
  166. }
  167. reconnectCounts++
  168. now := time.Now()
  169. if now.After(cutoffTime) {
  170. // reset
  171. cutoffTime = now.Add(time.Minute)
  172. reconnectDelay = time.Second
  173. reconnectCounts = 1
  174. }
  175. for {
  176. if atomic.LoadUint32(&svr.exit) != 0 {
  177. return
  178. }
  179. xl.Info("try to reconnect to server...")
  180. conn, cm, err := svr.login()
  181. if err != nil {
  182. xl.Warn("reconnect to server error: %v, wait %v for another retry", err, delayTime)
  183. util.RandomSleep(delayTime, 0.9, 1.1)
  184. delayTime *= 2
  185. if delayTime > maxDelayTime {
  186. delayTime = maxDelayTime
  187. }
  188. continue
  189. }
  190. // reconnect success, init delayTime
  191. delayTime = time.Second
  192. ctl := NewControl(svr.ctx, svr.runID, conn, cm, svr.cfg, svr.pxyCfgs, svr.visitorCfgs, svr.serverUDPPort, svr.authSetter)
  193. ctl.Run()
  194. svr.ctlMu.Lock()
  195. if svr.ctl != nil {
  196. svr.ctl.Close()
  197. }
  198. svr.ctl = ctl
  199. svr.ctlMu.Unlock()
  200. break
  201. }
  202. }
  203. }
  204. // login creates a connection to frps and registers it self as a client
  205. // conn: control connection
  206. // session: if it's not nil, using tcp mux
  207. func (svr *Service) login() (conn net.Conn, cm *ConnectionManager, err error) {
  208. xl := xlog.FromContextSafe(svr.ctx)
  209. cm = NewConnectionManager(svr.ctx, &svr.cfg)
  210. if err = cm.OpenConnection(); err != nil {
  211. return nil, nil, err
  212. }
  213. defer func() {
  214. if err != nil {
  215. cm.Close()
  216. }
  217. }()
  218. conn, err = cm.Connect()
  219. if err != nil {
  220. return
  221. }
  222. loginMsg := &msg.Login{
  223. Arch: runtime.GOARCH,
  224. Os: runtime.GOOS,
  225. PoolCount: svr.cfg.PoolCount,
  226. User: svr.cfg.User,
  227. Version: version.Full(),
  228. Timestamp: time.Now().Unix(),
  229. RunID: svr.runID,
  230. Metas: svr.cfg.Metas,
  231. }
  232. // Add auth
  233. if err = svr.authSetter.SetLogin(loginMsg); err != nil {
  234. return
  235. }
  236. if err = msg.WriteMsg(conn, loginMsg); err != nil {
  237. return
  238. }
  239. var loginRespMsg msg.LoginResp
  240. _ = conn.SetReadDeadline(time.Now().Add(10 * time.Second))
  241. if err = msg.ReadMsgInto(conn, &loginRespMsg); err != nil {
  242. return
  243. }
  244. _ = conn.SetReadDeadline(time.Time{})
  245. if loginRespMsg.Error != "" {
  246. err = fmt.Errorf("%s", loginRespMsg.Error)
  247. xl.Error("%s", loginRespMsg.Error)
  248. return
  249. }
  250. svr.runID = loginRespMsg.RunID
  251. xl.ResetPrefixes()
  252. xl.AppendPrefix(svr.runID)
  253. svr.serverUDPPort = loginRespMsg.ServerUDPPort
  254. xl.Info("login to server success, get run id [%s], server udp port [%d]", loginRespMsg.RunID, loginRespMsg.ServerUDPPort)
  255. return
  256. }
  257. func (svr *Service) ReloadConf(pxyCfgs map[string]config.ProxyConf, visitorCfgs map[string]config.VisitorConf) error {
  258. svr.cfgMu.Lock()
  259. svr.pxyCfgs = pxyCfgs
  260. svr.visitorCfgs = visitorCfgs
  261. svr.cfgMu.Unlock()
  262. svr.ctlMu.RLock()
  263. ctl := svr.ctl
  264. svr.ctlMu.RUnlock()
  265. if ctl != nil {
  266. return svr.ctl.ReloadConf(pxyCfgs, visitorCfgs)
  267. }
  268. return nil
  269. }
  270. func (svr *Service) Close() {
  271. svr.GracefulClose(time.Duration(0))
  272. }
  273. func (svr *Service) GracefulClose(d time.Duration) {
  274. atomic.StoreUint32(&svr.exit, 1)
  275. svr.ctlMu.RLock()
  276. if svr.ctl != nil {
  277. svr.ctl.GracefulClose(d)
  278. }
  279. svr.ctlMu.RUnlock()
  280. svr.cancel()
  281. }
  282. type ConnectionManager struct {
  283. ctx context.Context
  284. cfg *config.ClientCommonConf
  285. muxSession *fmux.Session
  286. quicConn quic.Connection
  287. }
  288. func NewConnectionManager(ctx context.Context, cfg *config.ClientCommonConf) *ConnectionManager {
  289. return &ConnectionManager{
  290. ctx: ctx,
  291. cfg: cfg,
  292. }
  293. }
  294. func (cm *ConnectionManager) OpenConnection() error {
  295. xl := xlog.FromContextSafe(cm.ctx)
  296. // special for quic
  297. if strings.EqualFold(cm.cfg.Protocol, "quic") {
  298. var tlsConfig *tls.Config
  299. var err error
  300. sn := cm.cfg.TLSServerName
  301. if sn == "" {
  302. sn = cm.cfg.ServerAddr
  303. }
  304. if cm.cfg.TLSEnable {
  305. tlsConfig, err = transport.NewClientTLSConfig(
  306. cm.cfg.TLSCertFile,
  307. cm.cfg.TLSKeyFile,
  308. cm.cfg.TLSTrustedCaFile,
  309. sn)
  310. } else {
  311. tlsConfig, err = transport.NewClientTLSConfig("", "", "", sn)
  312. }
  313. if err != nil {
  314. xl.Warn("fail to build tls configuration, err: %v", err)
  315. return err
  316. }
  317. tlsConfig.NextProtos = []string{"frp"}
  318. conn, err := quic.DialAddr(
  319. net.JoinHostPort(cm.cfg.ServerAddr, strconv.Itoa(cm.cfg.ServerPort)),
  320. tlsConfig, &quic.Config{
  321. MaxIdleTimeout: time.Duration(cm.cfg.QUICMaxIdleTimeout) * time.Second,
  322. MaxIncomingStreams: int64(cm.cfg.QUICMaxIncomingStreams),
  323. KeepAlivePeriod: time.Duration(cm.cfg.QUICKeepalivePeriod) * time.Second,
  324. })
  325. if err != nil {
  326. return err
  327. }
  328. cm.quicConn = conn
  329. return nil
  330. }
  331. if !cm.cfg.TCPMux {
  332. return nil
  333. }
  334. conn, err := cm.realConnect()
  335. if err != nil {
  336. return err
  337. }
  338. fmuxCfg := fmux.DefaultConfig()
  339. fmuxCfg.KeepAliveInterval = time.Duration(cm.cfg.TCPMuxKeepaliveInterval) * time.Second
  340. fmuxCfg.LogOutput = io.Discard
  341. session, err := fmux.Client(conn, fmuxCfg)
  342. if err != nil {
  343. return err
  344. }
  345. cm.muxSession = session
  346. return nil
  347. }
  348. func (cm *ConnectionManager) Connect() (net.Conn, error) {
  349. if cm.quicConn != nil {
  350. stream, err := cm.quicConn.OpenStreamSync(context.Background())
  351. if err != nil {
  352. return nil, err
  353. }
  354. return frpNet.QuicStreamToNetConn(stream, cm.quicConn), nil
  355. } else if cm.muxSession != nil {
  356. stream, err := cm.muxSession.OpenStream()
  357. if err != nil {
  358. return nil, err
  359. }
  360. return stream, nil
  361. }
  362. return cm.realConnect()
  363. }
  364. func (cm *ConnectionManager) realConnect() (net.Conn, error) {
  365. xl := xlog.FromContextSafe(cm.ctx)
  366. var tlsConfig *tls.Config
  367. var err error
  368. if cm.cfg.TLSEnable {
  369. sn := cm.cfg.TLSServerName
  370. if sn == "" {
  371. sn = cm.cfg.ServerAddr
  372. }
  373. tlsConfig, err = transport.NewClientTLSConfig(
  374. cm.cfg.TLSCertFile,
  375. cm.cfg.TLSKeyFile,
  376. cm.cfg.TLSTrustedCaFile,
  377. sn)
  378. if err != nil {
  379. xl.Warn("fail to build tls configuration, err: %v", err)
  380. return nil, err
  381. }
  382. }
  383. proxyType, addr, auth, err := libdial.ParseProxyURL(cm.cfg.HTTPProxy)
  384. if err != nil {
  385. xl.Error("fail to parse proxy url")
  386. return nil, err
  387. }
  388. dialOptions := []libdial.DialOption{}
  389. protocol := cm.cfg.Protocol
  390. if protocol == "websocket" {
  391. protocol = "tcp"
  392. dialOptions = append(dialOptions, libdial.WithAfterHook(libdial.AfterHook{Hook: frpNet.DialHookWebsocket()}))
  393. }
  394. if cm.cfg.ConnectServerLocalIP != "" {
  395. dialOptions = append(dialOptions, libdial.WithLocalAddr(cm.cfg.ConnectServerLocalIP))
  396. }
  397. dialOptions = append(dialOptions,
  398. libdial.WithProtocol(protocol),
  399. libdial.WithTimeout(time.Duration(cm.cfg.DialServerTimeout)*time.Second),
  400. libdial.WithKeepAlive(time.Duration(cm.cfg.DialServerKeepAlive)*time.Second),
  401. libdial.WithProxy(proxyType, addr),
  402. libdial.WithProxyAuth(auth),
  403. libdial.WithTLSConfig(tlsConfig),
  404. libdial.WithAfterHook(libdial.AfterHook{
  405. Hook: frpNet.DialHookCustomTLSHeadByte(tlsConfig != nil, cm.cfg.DisableCustomTLSFirstByte),
  406. }),
  407. )
  408. conn, err := libdial.Dial(
  409. net.JoinHostPort(cm.cfg.ServerAddr, strconv.Itoa(cm.cfg.ServerPort)),
  410. dialOptions...,
  411. )
  412. return conn, err
  413. }
  414. func (cm *ConnectionManager) Close() error {
  415. if cm.quicConn != nil {
  416. _ = cm.quicConn.CloseWithError(0, "")
  417. }
  418. if cm.muxSession != nil {
  419. _ = cm.muxSession.Close()
  420. }
  421. return nil
  422. }