control.go 8.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342
  1. // Copyright 2017 fatedier, fatedier@gmail.com
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package client
  15. import (
  16. "context"
  17. "crypto/tls"
  18. "fmt"
  19. "io"
  20. "net"
  21. "runtime/debug"
  22. "sync"
  23. "time"
  24. "github.com/fatedier/frp/client/proxy"
  25. "github.com/fatedier/frp/models/config"
  26. "github.com/fatedier/frp/models/msg"
  27. frpNet "github.com/fatedier/frp/utils/net"
  28. "github.com/fatedier/frp/utils/xlog"
  29. "github.com/fatedier/golib/control/shutdown"
  30. "github.com/fatedier/golib/crypto"
  31. fmux "github.com/hashicorp/yamux"
  32. )
  33. type Control struct {
  34. // uniq id got from frps, attach it in loginMsg
  35. runId string
  36. // manage all proxies
  37. pxyCfgs map[string]config.ProxyConf
  38. pm *proxy.ProxyManager
  39. // manage all visitors
  40. vm *VisitorManager
  41. // control connection
  42. conn net.Conn
  43. // tcp stream multiplexing, if enabled
  44. session *fmux.Session
  45. // put a message in this channel to send it over control connection to server
  46. sendCh chan (msg.Message)
  47. // read from this channel to get the next message sent by server
  48. readCh chan (msg.Message)
  49. // goroutines can block by reading from this channel, it will be closed only in reader() when control connection is closed
  50. closedCh chan struct{}
  51. closedDoneCh chan struct{}
  52. // last time got the Pong message
  53. lastPong time.Time
  54. // The client configuration
  55. clientCfg config.ClientCommonConf
  56. readerShutdown *shutdown.Shutdown
  57. writerShutdown *shutdown.Shutdown
  58. msgHandlerShutdown *shutdown.Shutdown
  59. // The UDP port that the server is listening on
  60. serverUDPPort int
  61. mu sync.RWMutex
  62. xl *xlog.Logger
  63. // service context
  64. ctx context.Context
  65. }
  66. func NewControl(ctx context.Context, runId string, conn net.Conn, session *fmux.Session,
  67. clientCfg config.ClientCommonConf,
  68. pxyCfgs map[string]config.ProxyConf,
  69. visitorCfgs map[string]config.VisitorConf,
  70. serverUDPPort int) *Control {
  71. // new xlog instance
  72. ctl := &Control{
  73. runId: runId,
  74. conn: conn,
  75. session: session,
  76. pxyCfgs: pxyCfgs,
  77. sendCh: make(chan msg.Message, 100),
  78. readCh: make(chan msg.Message, 100),
  79. closedCh: make(chan struct{}),
  80. closedDoneCh: make(chan struct{}),
  81. clientCfg: clientCfg,
  82. readerShutdown: shutdown.New(),
  83. writerShutdown: shutdown.New(),
  84. msgHandlerShutdown: shutdown.New(),
  85. serverUDPPort: serverUDPPort,
  86. xl: xlog.FromContextSafe(ctx),
  87. ctx: ctx,
  88. }
  89. ctl.pm = proxy.NewProxyManager(ctl.ctx, ctl.sendCh, clientCfg, serverUDPPort)
  90. ctl.vm = NewVisitorManager(ctl.ctx, ctl)
  91. ctl.vm.Reload(visitorCfgs)
  92. return ctl
  93. }
  94. func (ctl *Control) Run() {
  95. go ctl.worker()
  96. // start all proxies
  97. ctl.pm.Reload(ctl.pxyCfgs)
  98. // start all visitors
  99. go ctl.vm.Run()
  100. return
  101. }
  102. func (ctl *Control) HandleReqWorkConn(inMsg *msg.ReqWorkConn) {
  103. xl := ctl.xl
  104. workConn, err := ctl.connectServer()
  105. if err != nil {
  106. return
  107. }
  108. m := &msg.NewWorkConn{
  109. RunId: ctl.runId,
  110. }
  111. if err = msg.WriteMsg(workConn, m); err != nil {
  112. xl.Warn("work connection write to server error: %v", err)
  113. workConn.Close()
  114. return
  115. }
  116. var startMsg msg.StartWorkConn
  117. if err = msg.ReadMsgInto(workConn, &startMsg); err != nil {
  118. xl.Error("work connection closed before response StartWorkConn message: %v", err)
  119. workConn.Close()
  120. return
  121. }
  122. // dispatch this work connection to related proxy
  123. ctl.pm.HandleWorkConn(startMsg.ProxyName, workConn, &startMsg)
  124. }
  125. func (ctl *Control) HandleNewProxyResp(inMsg *msg.NewProxyResp) {
  126. xl := ctl.xl
  127. // Server will return NewProxyResp message to each NewProxy message.
  128. // Start a new proxy handler if no error got
  129. err := ctl.pm.StartProxy(inMsg.ProxyName, inMsg.RemoteAddr, inMsg.Error)
  130. if err != nil {
  131. xl.Warn("[%s] start error: %v", inMsg.ProxyName, err)
  132. } else {
  133. xl.Info("[%s] start proxy success", inMsg.ProxyName)
  134. }
  135. }
  136. func (ctl *Control) Close() error {
  137. ctl.pm.Close()
  138. ctl.conn.Close()
  139. if ctl.session != nil {
  140. ctl.session.Close()
  141. }
  142. return nil
  143. }
  144. // ClosedDoneCh returns a channel which will be closed after all resources are released
  145. func (ctl *Control) ClosedDoneCh() <-chan struct{} {
  146. return ctl.closedDoneCh
  147. }
  148. // connectServer return a new connection to frps
  149. func (ctl *Control) connectServer() (conn net.Conn, err error) {
  150. xl := ctl.xl
  151. if ctl.clientCfg.TcpMux {
  152. stream, errRet := ctl.session.OpenStream()
  153. if errRet != nil {
  154. err = errRet
  155. xl.Warn("start new connection to server error: %v", err)
  156. return
  157. }
  158. conn = stream
  159. } else {
  160. var tlsConfig *tls.Config
  161. if ctl.clientCfg.TLSEnable {
  162. tlsConfig = &tls.Config{
  163. InsecureSkipVerify: true,
  164. }
  165. }
  166. conn, err = frpNet.ConnectServerByProxyWithTLS(ctl.clientCfg.HttpProxy, ctl.clientCfg.Protocol,
  167. fmt.Sprintf("%s:%d", ctl.clientCfg.ServerAddr, ctl.clientCfg.ServerPort), tlsConfig)
  168. if err != nil {
  169. xl.Warn("start new connection to server error: %v", err)
  170. return
  171. }
  172. }
  173. return
  174. }
  175. // reader read all messages from frps and send to readCh
  176. func (ctl *Control) reader() {
  177. xl := ctl.xl
  178. defer func() {
  179. if err := recover(); err != nil {
  180. xl.Error("panic error: %v", err)
  181. xl.Error(string(debug.Stack()))
  182. }
  183. }()
  184. defer ctl.readerShutdown.Done()
  185. defer close(ctl.closedCh)
  186. encReader := crypto.NewReader(ctl.conn, []byte(ctl.clientCfg.Token))
  187. for {
  188. if m, err := msg.ReadMsg(encReader); err != nil {
  189. if err == io.EOF {
  190. xl.Debug("read from control connection EOF")
  191. return
  192. } else {
  193. xl.Warn("read error: %v", err)
  194. ctl.conn.Close()
  195. return
  196. }
  197. } else {
  198. ctl.readCh <- m
  199. }
  200. }
  201. }
  202. // writer writes messages got from sendCh to frps
  203. func (ctl *Control) writer() {
  204. xl := ctl.xl
  205. defer ctl.writerShutdown.Done()
  206. encWriter, err := crypto.NewWriter(ctl.conn, []byte(ctl.clientCfg.Token))
  207. if err != nil {
  208. xl.Error("crypto new writer error: %v", err)
  209. ctl.conn.Close()
  210. return
  211. }
  212. for {
  213. if m, ok := <-ctl.sendCh; !ok {
  214. xl.Info("control writer is closing")
  215. return
  216. } else {
  217. if err := msg.WriteMsg(encWriter, m); err != nil {
  218. xl.Warn("write message to control connection error: %v", err)
  219. return
  220. }
  221. }
  222. }
  223. }
  224. // msgHandler handles all channel events and do corresponding operations.
  225. func (ctl *Control) msgHandler() {
  226. xl := ctl.xl
  227. defer func() {
  228. if err := recover(); err != nil {
  229. xl.Error("panic error: %v", err)
  230. xl.Error(string(debug.Stack()))
  231. }
  232. }()
  233. defer ctl.msgHandlerShutdown.Done()
  234. hbSend := time.NewTicker(time.Duration(ctl.clientCfg.HeartBeatInterval) * time.Second)
  235. defer hbSend.Stop()
  236. hbCheck := time.NewTicker(time.Second)
  237. defer hbCheck.Stop()
  238. ctl.lastPong = time.Now()
  239. for {
  240. select {
  241. case <-hbSend.C:
  242. // send heartbeat to server
  243. xl.Debug("send heartbeat to server")
  244. ctl.sendCh <- &msg.Ping{}
  245. case <-hbCheck.C:
  246. if time.Since(ctl.lastPong) > time.Duration(ctl.clientCfg.HeartBeatTimeout)*time.Second {
  247. xl.Warn("heartbeat timeout")
  248. // let reader() stop
  249. ctl.conn.Close()
  250. return
  251. }
  252. case rawMsg, ok := <-ctl.readCh:
  253. if !ok {
  254. return
  255. }
  256. switch m := rawMsg.(type) {
  257. case *msg.ReqWorkConn:
  258. go ctl.HandleReqWorkConn(m)
  259. case *msg.NewProxyResp:
  260. ctl.HandleNewProxyResp(m)
  261. case *msg.Pong:
  262. ctl.lastPong = time.Now()
  263. xl.Debug("receive heartbeat from server")
  264. }
  265. }
  266. }
  267. }
  268. // If controler is notified by closedCh, reader and writer and handler will exit
  269. func (ctl *Control) worker() {
  270. go ctl.msgHandler()
  271. go ctl.reader()
  272. go ctl.writer()
  273. select {
  274. case <-ctl.closedCh:
  275. // close related channels and wait until other goroutines done
  276. close(ctl.readCh)
  277. ctl.readerShutdown.WaitDone()
  278. ctl.msgHandlerShutdown.WaitDone()
  279. close(ctl.sendCh)
  280. ctl.writerShutdown.WaitDone()
  281. ctl.pm.Close()
  282. ctl.vm.Close()
  283. close(ctl.closedDoneCh)
  284. if ctl.session != nil {
  285. ctl.session.Close()
  286. }
  287. return
  288. }
  289. }
  290. func (ctl *Control) ReloadConf(pxyCfgs map[string]config.ProxyConf, visitorCfgs map[string]config.VisitorConf) error {
  291. ctl.vm.Reload(visitorCfgs)
  292. ctl.pm.Reload(pxyCfgs)
  293. return nil
  294. }