1
0

control.go 9.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363
  1. // Copyright 2017 fatedier, fatedier@gmail.com
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package client
  15. import (
  16. "context"
  17. "io"
  18. "net"
  19. "runtime/debug"
  20. "time"
  21. "github.com/fatedier/golib/control/shutdown"
  22. "github.com/fatedier/golib/crypto"
  23. "github.com/samber/lo"
  24. "github.com/fatedier/frp/client/proxy"
  25. "github.com/fatedier/frp/client/visitor"
  26. "github.com/fatedier/frp/pkg/auth"
  27. v1 "github.com/fatedier/frp/pkg/config/v1"
  28. "github.com/fatedier/frp/pkg/msg"
  29. "github.com/fatedier/frp/pkg/transport"
  30. "github.com/fatedier/frp/pkg/util/xlog"
  31. )
  32. type Control struct {
  33. // service context
  34. ctx context.Context
  35. xl *xlog.Logger
  36. // Unique ID obtained from frps.
  37. // It should be attached to the login message when reconnecting.
  38. runID string
  39. // manage all proxies
  40. pxyCfgs []v1.ProxyConfigurer
  41. pm *proxy.Manager
  42. // manage all visitors
  43. vm *visitor.Manager
  44. // control connection
  45. conn net.Conn
  46. cm *ConnectionManager
  47. // put a message in this channel to send it over control connection to server
  48. sendCh chan (msg.Message)
  49. // read from this channel to get the next message sent by server
  50. readCh chan (msg.Message)
  51. // goroutines can block by reading from this channel, it will be closed only in reader() when control connection is closed
  52. closedCh chan struct{}
  53. closedDoneCh chan struct{}
  54. // last time got the Pong message
  55. lastPong time.Time
  56. // The client configuration
  57. clientCfg *v1.ClientCommonConfig
  58. readerShutdown *shutdown.Shutdown
  59. writerShutdown *shutdown.Shutdown
  60. msgHandlerShutdown *shutdown.Shutdown
  61. // sets authentication based on selected method
  62. authSetter auth.Setter
  63. msgTransporter transport.MessageTransporter
  64. }
  65. func NewControl(
  66. ctx context.Context, runID string, conn net.Conn, cm *ConnectionManager,
  67. clientCfg *v1.ClientCommonConfig,
  68. pxyCfgs []v1.ProxyConfigurer,
  69. visitorCfgs []v1.VisitorConfigurer,
  70. authSetter auth.Setter,
  71. ) *Control {
  72. // new xlog instance
  73. ctl := &Control{
  74. ctx: ctx,
  75. xl: xlog.FromContextSafe(ctx),
  76. runID: runID,
  77. conn: conn,
  78. cm: cm,
  79. pxyCfgs: pxyCfgs,
  80. sendCh: make(chan msg.Message, 100),
  81. readCh: make(chan msg.Message, 100),
  82. closedCh: make(chan struct{}),
  83. closedDoneCh: make(chan struct{}),
  84. clientCfg: clientCfg,
  85. readerShutdown: shutdown.New(),
  86. writerShutdown: shutdown.New(),
  87. msgHandlerShutdown: shutdown.New(),
  88. authSetter: authSetter,
  89. }
  90. ctl.msgTransporter = transport.NewMessageTransporter(ctl.sendCh)
  91. ctl.pm = proxy.NewManager(ctl.ctx, clientCfg, ctl.msgTransporter)
  92. ctl.vm = visitor.NewManager(ctl.ctx, ctl.runID, ctl.clientCfg, ctl.connectServer, ctl.msgTransporter)
  93. ctl.vm.Reload(visitorCfgs)
  94. return ctl
  95. }
  96. func (ctl *Control) Run() {
  97. go ctl.worker()
  98. // start all proxies
  99. ctl.pm.Reload(ctl.pxyCfgs)
  100. // start all visitors
  101. go ctl.vm.Run()
  102. }
  103. func (ctl *Control) HandleReqWorkConn(_ *msg.ReqWorkConn) {
  104. xl := ctl.xl
  105. workConn, err := ctl.connectServer()
  106. if err != nil {
  107. xl.Warn("start new connection to server error: %v", err)
  108. return
  109. }
  110. m := &msg.NewWorkConn{
  111. RunID: ctl.runID,
  112. }
  113. if err = ctl.authSetter.SetNewWorkConn(m); err != nil {
  114. xl.Warn("error during NewWorkConn authentication: %v", err)
  115. return
  116. }
  117. if err = msg.WriteMsg(workConn, m); err != nil {
  118. xl.Warn("work connection write to server error: %v", err)
  119. workConn.Close()
  120. return
  121. }
  122. var startMsg msg.StartWorkConn
  123. if err = msg.ReadMsgInto(workConn, &startMsg); err != nil {
  124. xl.Trace("work connection closed before response StartWorkConn message: %v", err)
  125. workConn.Close()
  126. return
  127. }
  128. if startMsg.Error != "" {
  129. xl.Error("StartWorkConn contains error: %s", startMsg.Error)
  130. workConn.Close()
  131. return
  132. }
  133. // dispatch this work connection to related proxy
  134. ctl.pm.HandleWorkConn(startMsg.ProxyName, workConn, &startMsg)
  135. }
  136. func (ctl *Control) HandleNewProxyResp(inMsg *msg.NewProxyResp) {
  137. xl := ctl.xl
  138. // Server will return NewProxyResp message to each NewProxy message.
  139. // Start a new proxy handler if no error got
  140. err := ctl.pm.StartProxy(inMsg.ProxyName, inMsg.RemoteAddr, inMsg.Error)
  141. if err != nil {
  142. xl.Warn("[%s] start error: %v", inMsg.ProxyName, err)
  143. } else {
  144. xl.Info("[%s] start proxy success", inMsg.ProxyName)
  145. }
  146. }
  147. func (ctl *Control) HandleNatHoleResp(inMsg *msg.NatHoleResp) {
  148. xl := ctl.xl
  149. // Dispatch the NatHoleResp message to the related proxy.
  150. ok := ctl.msgTransporter.DispatchWithType(inMsg, msg.TypeNameNatHoleResp, inMsg.TransactionID)
  151. if !ok {
  152. xl.Trace("dispatch NatHoleResp message to related proxy error")
  153. }
  154. }
  155. func (ctl *Control) Close() error {
  156. return ctl.GracefulClose(0)
  157. }
  158. func (ctl *Control) GracefulClose(d time.Duration) error {
  159. ctl.pm.Close()
  160. ctl.vm.Close()
  161. time.Sleep(d)
  162. ctl.conn.Close()
  163. ctl.cm.Close()
  164. return nil
  165. }
  166. // ClosedDoneCh returns a channel that will be closed after all resources are released
  167. func (ctl *Control) ClosedDoneCh() <-chan struct{} {
  168. return ctl.closedDoneCh
  169. }
  170. // connectServer return a new connection to frps
  171. func (ctl *Control) connectServer() (conn net.Conn, err error) {
  172. return ctl.cm.Connect()
  173. }
  174. // reader read all messages from frps and send to readCh
  175. func (ctl *Control) reader() {
  176. xl := ctl.xl
  177. defer func() {
  178. if err := recover(); err != nil {
  179. xl.Error("panic error: %v", err)
  180. xl.Error(string(debug.Stack()))
  181. }
  182. }()
  183. defer ctl.readerShutdown.Done()
  184. defer close(ctl.closedCh)
  185. encReader := crypto.NewReader(ctl.conn, []byte(ctl.clientCfg.Auth.Token))
  186. for {
  187. m, err := msg.ReadMsg(encReader)
  188. if err != nil {
  189. if err == io.EOF {
  190. xl.Debug("read from control connection EOF")
  191. return
  192. }
  193. xl.Warn("read error: %v", err)
  194. ctl.conn.Close()
  195. return
  196. }
  197. ctl.readCh <- m
  198. }
  199. }
  200. // writer writes messages got from sendCh to frps
  201. func (ctl *Control) writer() {
  202. xl := ctl.xl
  203. defer ctl.writerShutdown.Done()
  204. encWriter, err := crypto.NewWriter(ctl.conn, []byte(ctl.clientCfg.Auth.Token))
  205. if err != nil {
  206. xl.Error("crypto new writer error: %v", err)
  207. ctl.conn.Close()
  208. return
  209. }
  210. for {
  211. m, ok := <-ctl.sendCh
  212. if !ok {
  213. xl.Info("control writer is closing")
  214. return
  215. }
  216. if err := msg.WriteMsg(encWriter, m); err != nil {
  217. xl.Warn("write message to control connection error: %v", err)
  218. return
  219. }
  220. }
  221. }
  222. // msgHandler handles all channel events and performs corresponding operations.
  223. func (ctl *Control) msgHandler() {
  224. xl := ctl.xl
  225. defer func() {
  226. if err := recover(); err != nil {
  227. xl.Error("panic error: %v", err)
  228. xl.Error(string(debug.Stack()))
  229. }
  230. }()
  231. defer ctl.msgHandlerShutdown.Done()
  232. var hbSendCh <-chan time.Time
  233. // TODO(fatedier): disable heartbeat if TCPMux is enabled.
  234. // Just keep it here to keep compatible with old version frps.
  235. if ctl.clientCfg.Transport.HeartbeatInterval > 0 {
  236. hbSend := time.NewTicker(time.Duration(ctl.clientCfg.Transport.HeartbeatInterval) * time.Second)
  237. defer hbSend.Stop()
  238. hbSendCh = hbSend.C
  239. }
  240. var hbCheckCh <-chan time.Time
  241. // Check heartbeat timeout only if TCPMux is not enabled and users don't disable heartbeat feature.
  242. if ctl.clientCfg.Transport.HeartbeatInterval > 0 && ctl.clientCfg.Transport.HeartbeatTimeout > 0 &&
  243. !lo.FromPtr(ctl.clientCfg.Transport.TCPMux) {
  244. hbCheck := time.NewTicker(time.Second)
  245. defer hbCheck.Stop()
  246. hbCheckCh = hbCheck.C
  247. }
  248. ctl.lastPong = time.Now()
  249. for {
  250. select {
  251. case <-hbSendCh:
  252. // send heartbeat to server
  253. xl.Debug("send heartbeat to server")
  254. pingMsg := &msg.Ping{}
  255. if err := ctl.authSetter.SetPing(pingMsg); err != nil {
  256. xl.Warn("error during ping authentication: %v", err)
  257. return
  258. }
  259. ctl.sendCh <- pingMsg
  260. case <-hbCheckCh:
  261. if time.Since(ctl.lastPong) > time.Duration(ctl.clientCfg.Transport.HeartbeatTimeout)*time.Second {
  262. xl.Warn("heartbeat timeout")
  263. // let reader() stop
  264. ctl.conn.Close()
  265. return
  266. }
  267. case rawMsg, ok := <-ctl.readCh:
  268. if !ok {
  269. return
  270. }
  271. switch m := rawMsg.(type) {
  272. case *msg.ReqWorkConn:
  273. go ctl.HandleReqWorkConn(m)
  274. case *msg.NewProxyResp:
  275. ctl.HandleNewProxyResp(m)
  276. case *msg.NatHoleResp:
  277. ctl.HandleNatHoleResp(m)
  278. case *msg.Pong:
  279. if m.Error != "" {
  280. xl.Error("Pong contains error: %s", m.Error)
  281. ctl.conn.Close()
  282. return
  283. }
  284. ctl.lastPong = time.Now()
  285. xl.Debug("receive heartbeat from server")
  286. }
  287. }
  288. }
  289. }
  290. // If controler is notified by closedCh, reader and writer and handler will exit
  291. func (ctl *Control) worker() {
  292. go ctl.msgHandler()
  293. go ctl.reader()
  294. go ctl.writer()
  295. <-ctl.closedCh
  296. // close related channels and wait until other goroutines done
  297. close(ctl.readCh)
  298. ctl.readerShutdown.WaitDone()
  299. ctl.msgHandlerShutdown.WaitDone()
  300. close(ctl.sendCh)
  301. ctl.writerShutdown.WaitDone()
  302. ctl.pm.Close()
  303. ctl.vm.Close()
  304. close(ctl.closedDoneCh)
  305. ctl.cm.Close()
  306. }
  307. func (ctl *Control) ReloadConf(pxyCfgs []v1.ProxyConfigurer, visitorCfgs []v1.VisitorConfigurer) error {
  308. ctl.vm.Reload(visitorCfgs)
  309. ctl.pm.Reload(pxyCfgs)
  310. return nil
  311. }