1
0

control.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472
  1. // Copyright 2017 fatedier, fatedier@gmail.com
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package client
  15. import (
  16. "fmt"
  17. "io"
  18. "runtime"
  19. "sync"
  20. "time"
  21. "github.com/fatedier/frp/models/config"
  22. "github.com/fatedier/frp/models/msg"
  23. "github.com/fatedier/frp/utils/crypto"
  24. "github.com/fatedier/frp/utils/log"
  25. frpNet "github.com/fatedier/frp/utils/net"
  26. "github.com/fatedier/frp/utils/util"
  27. "github.com/fatedier/frp/utils/version"
  28. "github.com/xtaci/smux"
  29. )
  30. const (
  31. connReadTimeout time.Duration = 10 * time.Second
  32. )
  33. type Control struct {
  34. // frpc service
  35. svr *Service
  36. // login message to server
  37. loginMsg *msg.Login
  38. // proxy configures
  39. pxyCfgs map[string]config.ProxyConf
  40. // proxies
  41. proxies map[string]Proxy
  42. // vistor configures
  43. vistorCfgs map[string]config.ProxyConf
  44. // vistors
  45. vistors map[string]Vistor
  46. // control connection
  47. conn frpNet.Conn
  48. // tcp stream multiplexing, if enabled
  49. session *smux.Session
  50. // put a message in this channel to send it over control connection to server
  51. sendCh chan (msg.Message)
  52. // read from this channel to get the next message sent by server
  53. readCh chan (msg.Message)
  54. // run id got from server
  55. runId string
  56. // connection or other error happens , control will try to reconnect to server
  57. closed int32
  58. // goroutines can block by reading from this channel, it will be closed only in reader() when control connection is closed
  59. closedCh chan int
  60. // last time got the Pong message
  61. lastPong time.Time
  62. mu sync.RWMutex
  63. log.Logger
  64. }
  65. func NewControl(svr *Service, pxyCfgs map[string]config.ProxyConf, vistorCfgs map[string]config.ProxyConf) *Control {
  66. loginMsg := &msg.Login{
  67. Arch: runtime.GOARCH,
  68. Os: runtime.GOOS,
  69. PoolCount: config.ClientCommonCfg.PoolCount,
  70. User: config.ClientCommonCfg.User,
  71. Version: version.Full(),
  72. }
  73. return &Control{
  74. svr: svr,
  75. loginMsg: loginMsg,
  76. pxyCfgs: pxyCfgs,
  77. vistorCfgs: vistorCfgs,
  78. proxies: make(map[string]Proxy),
  79. vistors: make(map[string]Vistor),
  80. sendCh: make(chan msg.Message, 10),
  81. readCh: make(chan msg.Message, 10),
  82. closedCh: make(chan int),
  83. Logger: log.NewPrefixLogger(""),
  84. }
  85. }
  86. // 1. login
  87. // 2. start reader() writer() manager()
  88. // 3. connection closed
  89. // 4. In reader(): close closedCh and exit, controler() get it
  90. // 5. In controler(): close readCh and sendCh, manager() and writer() will exit
  91. // 6. In controler(): ini readCh, sendCh, closedCh
  92. // 7. In controler(): start new reader(), writer(), manager()
  93. // controler() will keep running
  94. func (ctl *Control) Run() (err error) {
  95. for {
  96. err = ctl.login()
  97. if err != nil {
  98. ctl.Warn("login to server failed: %v", err)
  99. // if login_fail_exit is true, just exit this program
  100. // otherwise sleep a while and continues relogin to server
  101. if config.ClientCommonCfg.LoginFailExit {
  102. return
  103. } else {
  104. time.Sleep(30 * time.Second)
  105. }
  106. } else {
  107. break
  108. }
  109. }
  110. go ctl.controler()
  111. go ctl.manager()
  112. go ctl.writer()
  113. go ctl.reader()
  114. // send NewProxy message for all configured proxies
  115. for _, cfg := range ctl.pxyCfgs {
  116. var newProxyMsg msg.NewProxy
  117. cfg.UnMarshalToMsg(&newProxyMsg)
  118. ctl.sendCh <- &newProxyMsg
  119. }
  120. // start all local vistors
  121. for _, cfg := range ctl.vistorCfgs {
  122. vistor := NewVistor(ctl, cfg)
  123. err = vistor.Run()
  124. if err != nil {
  125. vistor.Warn("start error: %v", err)
  126. continue
  127. }
  128. ctl.vistors[cfg.GetName()] = vistor
  129. vistor.Info("start vistor success")
  130. }
  131. return nil
  132. }
  133. func (ctl *Control) NewWorkConn() {
  134. workConn, err := ctl.connectServer()
  135. if err != nil {
  136. return
  137. }
  138. m := &msg.NewWorkConn{
  139. RunId: ctl.runId,
  140. }
  141. if err = msg.WriteMsg(workConn, m); err != nil {
  142. ctl.Warn("work connection write to server error: %v", err)
  143. workConn.Close()
  144. return
  145. }
  146. var startMsg msg.StartWorkConn
  147. if err = msg.ReadMsgInto(workConn, &startMsg); err != nil {
  148. ctl.Error("work connection closed, %v", err)
  149. workConn.Close()
  150. return
  151. }
  152. workConn.AddLogPrefix(startMsg.ProxyName)
  153. // dispatch this work connection to related proxy
  154. if pxy, ok := ctl.proxies[startMsg.ProxyName]; ok {
  155. workConn.Debug("start a new work connection, localAddr: %s remoteAddr: %s", workConn.LocalAddr().String(), workConn.RemoteAddr().String())
  156. go pxy.InWorkConn(workConn)
  157. } else {
  158. workConn.Close()
  159. }
  160. }
  161. func (ctl *Control) init() {
  162. ctl.sendCh = make(chan msg.Message, 10)
  163. ctl.readCh = make(chan msg.Message, 10)
  164. ctl.closedCh = make(chan int)
  165. }
  166. // login send a login message to server and wait for a loginResp message.
  167. func (ctl *Control) login() (err error) {
  168. if ctl.conn != nil {
  169. ctl.conn.Close()
  170. }
  171. if ctl.session != nil {
  172. ctl.session.Close()
  173. }
  174. conn, err := frpNet.ConnectServerByHttpProxy(config.ClientCommonCfg.HttpProxy, config.ClientCommonCfg.Protocol,
  175. fmt.Sprintf("%s:%d", config.ClientCommonCfg.ServerAddr, config.ClientCommonCfg.ServerPort))
  176. if err != nil {
  177. return err
  178. }
  179. defer func() {
  180. if err != nil {
  181. conn.Close()
  182. }
  183. }()
  184. if config.ClientCommonCfg.TcpMux {
  185. session, errRet := smux.Client(conn, nil)
  186. if errRet != nil {
  187. return errRet
  188. }
  189. stream, errRet := session.OpenStream()
  190. if errRet != nil {
  191. session.Close()
  192. return errRet
  193. }
  194. conn = frpNet.WrapConn(stream)
  195. ctl.session = session
  196. }
  197. now := time.Now().Unix()
  198. ctl.loginMsg.PrivilegeKey = util.GetAuthKey(config.ClientCommonCfg.PrivilegeToken, now)
  199. ctl.loginMsg.Timestamp = now
  200. ctl.loginMsg.RunId = ctl.runId
  201. if err = msg.WriteMsg(conn, ctl.loginMsg); err != nil {
  202. return err
  203. }
  204. var loginRespMsg msg.LoginResp
  205. conn.SetReadDeadline(time.Now().Add(connReadTimeout))
  206. if err = msg.ReadMsgInto(conn, &loginRespMsg); err != nil {
  207. return err
  208. }
  209. conn.SetReadDeadline(time.Time{})
  210. if loginRespMsg.Error != "" {
  211. err = fmt.Errorf("%s", loginRespMsg.Error)
  212. ctl.Error("%s", loginRespMsg.Error)
  213. return err
  214. }
  215. ctl.conn = conn
  216. // update runId got from server
  217. ctl.runId = loginRespMsg.RunId
  218. ctl.ClearLogPrefix()
  219. ctl.AddLogPrefix(loginRespMsg.RunId)
  220. ctl.Info("login to server success, get run id [%s]", loginRespMsg.RunId)
  221. // login success, so we let closedCh available again
  222. ctl.closedCh = make(chan int)
  223. ctl.lastPong = time.Now()
  224. return nil
  225. }
  226. func (ctl *Control) connectServer() (conn frpNet.Conn, err error) {
  227. if config.ClientCommonCfg.TcpMux {
  228. stream, errRet := ctl.session.OpenStream()
  229. if errRet != nil {
  230. err = errRet
  231. ctl.Warn("start new connection to server error: %v", err)
  232. return
  233. }
  234. conn = frpNet.WrapConn(stream)
  235. } else {
  236. conn, err = frpNet.ConnectServerByHttpProxy(config.ClientCommonCfg.HttpProxy, config.ClientCommonCfg.Protocol,
  237. fmt.Sprintf("%s:%d", config.ClientCommonCfg.ServerAddr, config.ClientCommonCfg.ServerPort))
  238. if err != nil {
  239. ctl.Warn("start new connection to server error: %v", err)
  240. return
  241. }
  242. }
  243. return
  244. }
  245. func (ctl *Control) reader() {
  246. defer func() {
  247. if err := recover(); err != nil {
  248. ctl.Error("panic error: %v", err)
  249. }
  250. }()
  251. defer close(ctl.closedCh)
  252. encReader := crypto.NewReader(ctl.conn, []byte(config.ClientCommonCfg.PrivilegeToken))
  253. for {
  254. if m, err := msg.ReadMsg(encReader); err != nil {
  255. if err == io.EOF {
  256. ctl.Debug("read from control connection EOF")
  257. return
  258. } else {
  259. ctl.Warn("read error: %v", err)
  260. return
  261. }
  262. } else {
  263. ctl.readCh <- m
  264. }
  265. }
  266. }
  267. func (ctl *Control) writer() {
  268. encWriter, err := crypto.NewWriter(ctl.conn, []byte(config.ClientCommonCfg.PrivilegeToken))
  269. if err != nil {
  270. ctl.conn.Error("crypto new writer error: %v", err)
  271. ctl.conn.Close()
  272. return
  273. }
  274. for {
  275. if m, ok := <-ctl.sendCh; !ok {
  276. ctl.Info("control writer is closing")
  277. return
  278. } else {
  279. if err := msg.WriteMsg(encWriter, m); err != nil {
  280. ctl.Warn("write message to control connection error: %v", err)
  281. return
  282. }
  283. }
  284. }
  285. }
  286. func (ctl *Control) manager() {
  287. defer func() {
  288. if err := recover(); err != nil {
  289. ctl.Error("panic error: %v", err)
  290. }
  291. }()
  292. hbSend := time.NewTicker(time.Duration(config.ClientCommonCfg.HeartBeatInterval) * time.Second)
  293. defer hbSend.Stop()
  294. hbCheck := time.NewTicker(time.Second)
  295. defer hbCheck.Stop()
  296. for {
  297. select {
  298. case <-hbSend.C:
  299. // send heartbeat to server
  300. ctl.Debug("send heartbeat to server")
  301. ctl.sendCh <- &msg.Ping{}
  302. case <-hbCheck.C:
  303. if time.Since(ctl.lastPong) > time.Duration(config.ClientCommonCfg.HeartBeatTimeout)*time.Second {
  304. ctl.Warn("heartbeat timeout")
  305. // let reader() stop
  306. ctl.conn.Close()
  307. return
  308. }
  309. case rawMsg, ok := <-ctl.readCh:
  310. if !ok {
  311. return
  312. }
  313. switch m := rawMsg.(type) {
  314. case *msg.ReqWorkConn:
  315. go ctl.NewWorkConn()
  316. case *msg.NewProxyResp:
  317. // Server will return NewProxyResp message to each NewProxy message.
  318. // Start a new proxy handler if no error got
  319. if m.Error != "" {
  320. ctl.Warn("[%s] start error: %s", m.ProxyName, m.Error)
  321. continue
  322. }
  323. cfg, ok := ctl.pxyCfgs[m.ProxyName]
  324. if !ok {
  325. // it will never go to this branch now
  326. ctl.Warn("[%s] no proxy conf found", m.ProxyName)
  327. continue
  328. }
  329. oldPxy, ok := ctl.proxies[m.ProxyName]
  330. if ok {
  331. oldPxy.Close()
  332. }
  333. pxy := NewProxy(ctl, cfg)
  334. if err := pxy.Run(); err != nil {
  335. ctl.Warn("[%s] proxy start running error: %v", m.ProxyName, err)
  336. ctl.sendCh <- &msg.CloseProxy{
  337. ProxyName: m.ProxyName,
  338. }
  339. continue
  340. }
  341. ctl.proxies[m.ProxyName] = pxy
  342. ctl.Info("[%s] start proxy success", m.ProxyName)
  343. case *msg.Pong:
  344. ctl.lastPong = time.Now()
  345. ctl.Debug("receive heartbeat from server")
  346. }
  347. }
  348. }
  349. }
  350. // control keep watching closedCh, start a new connection if previous control connection is closed
  351. func (ctl *Control) controler() {
  352. var err error
  353. maxDelayTime := 30 * time.Second
  354. delayTime := time.Second
  355. checkInterval := 30 * time.Second
  356. checkProxyTicker := time.NewTicker(checkInterval)
  357. for {
  358. select {
  359. case <-checkProxyTicker.C:
  360. // Every 30 seconds, check which proxy registered failed and reregister it to server.
  361. for _, cfg := range ctl.pxyCfgs {
  362. if _, exist := ctl.proxies[cfg.GetName()]; !exist {
  363. ctl.Info("try to reregister proxy [%s]", cfg.GetName())
  364. var newProxyMsg msg.NewProxy
  365. cfg.UnMarshalToMsg(&newProxyMsg)
  366. ctl.sendCh <- &newProxyMsg
  367. }
  368. }
  369. case _, ok := <-ctl.closedCh:
  370. // we won't get any variable from this channel
  371. if !ok {
  372. // close related channels
  373. close(ctl.readCh)
  374. close(ctl.sendCh)
  375. for _, pxy := range ctl.proxies {
  376. pxy.Close()
  377. }
  378. time.Sleep(time.Second)
  379. // loop util reconnect to server success
  380. for {
  381. ctl.Info("try to reconnect to server...")
  382. err = ctl.login()
  383. if err != nil {
  384. ctl.Warn("reconnect to server error: %v", err)
  385. time.Sleep(delayTime)
  386. delayTime = delayTime * 2
  387. if delayTime > maxDelayTime {
  388. delayTime = maxDelayTime
  389. }
  390. continue
  391. }
  392. // reconnect success, init the delayTime
  393. delayTime = time.Second
  394. break
  395. }
  396. // init related channels and variables
  397. ctl.init()
  398. // previous work goroutines should be closed and start them here
  399. go ctl.manager()
  400. go ctl.writer()
  401. go ctl.reader()
  402. // send NewProxy message for all configured proxies
  403. for _, cfg := range ctl.pxyCfgs {
  404. var newProxyMsg msg.NewProxy
  405. cfg.UnMarshalToMsg(&newProxyMsg)
  406. ctl.sendCh <- &newProxyMsg
  407. }
  408. checkProxyTicker.Stop()
  409. checkProxyTicker = time.NewTicker(checkInterval)
  410. }
  411. }
  412. }
  413. }