service.go 6.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249
  1. // Copyright 2017 fatedier, fatedier@gmail.com
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package client
  15. import (
  16. "crypto/tls"
  17. "fmt"
  18. "io/ioutil"
  19. "runtime"
  20. "sync"
  21. "sync/atomic"
  22. "time"
  23. "github.com/fatedier/frp/assets"
  24. "github.com/fatedier/frp/models/config"
  25. "github.com/fatedier/frp/models/msg"
  26. "github.com/fatedier/frp/utils/log"
  27. frpNet "github.com/fatedier/frp/utils/net"
  28. "github.com/fatedier/frp/utils/util"
  29. "github.com/fatedier/frp/utils/version"
  30. fmux "github.com/hashicorp/yamux"
  31. )
  32. type Service struct {
  33. // uniq id got from frps, attach it in loginMsg
  34. runId string
  35. // manager control connection with server
  36. ctl *Control
  37. ctlMu sync.RWMutex
  38. cfg config.ClientCommonConf
  39. pxyCfgs map[string]config.ProxyConf
  40. visitorCfgs map[string]config.VisitorConf
  41. cfgMu sync.RWMutex
  42. // The configuration file used to initialize this client, or an empty
  43. // string if no configuration file was used.
  44. cfgFile string
  45. // This is configured by the login response from frps
  46. serverUDPPort int
  47. exit uint32 // 0 means not exit
  48. closedCh chan int
  49. }
  50. func NewService(cfg config.ClientCommonConf, pxyCfgs map[string]config.ProxyConf, visitorCfgs map[string]config.VisitorConf, cfgFile string) (svr *Service, err error) {
  51. svr = &Service{
  52. cfg: cfg,
  53. cfgFile: cfgFile,
  54. pxyCfgs: pxyCfgs,
  55. visitorCfgs: visitorCfgs,
  56. exit: 0,
  57. closedCh: make(chan int),
  58. }
  59. return
  60. }
  61. func (svr *Service) GetController() *Control {
  62. svr.ctlMu.RLock()
  63. defer svr.ctlMu.RUnlock()
  64. return svr.ctl
  65. }
  66. func (svr *Service) Run() error {
  67. // first login
  68. for {
  69. conn, session, err := svr.login()
  70. if err != nil {
  71. log.Warn("login to server failed: %v", err)
  72. // if login_fail_exit is true, just exit this program
  73. // otherwise sleep a while and try again to connect to server
  74. if svr.cfg.LoginFailExit {
  75. return err
  76. } else {
  77. time.Sleep(10 * time.Second)
  78. }
  79. } else {
  80. // login success
  81. ctl := NewControl(svr.runId, conn, session, svr.cfg, svr.pxyCfgs, svr.visitorCfgs, svr.serverUDPPort)
  82. ctl.Run()
  83. svr.ctlMu.Lock()
  84. svr.ctl = ctl
  85. svr.ctlMu.Unlock()
  86. break
  87. }
  88. }
  89. go svr.keepControllerWorking()
  90. if svr.cfg.AdminPort != 0 {
  91. // Init admin server assets
  92. err := assets.Load(svr.cfg.AssetsDir)
  93. if err != nil {
  94. return fmt.Errorf("Load assets error: %v", err)
  95. }
  96. err = svr.RunAdminServer(svr.cfg.AdminAddr, svr.cfg.AdminPort)
  97. if err != nil {
  98. log.Warn("run admin server error: %v", err)
  99. }
  100. log.Info("admin server listen on %s:%d", svr.cfg.AdminAddr, svr.cfg.AdminPort)
  101. }
  102. <-svr.closedCh
  103. return nil
  104. }
  105. func (svr *Service) keepControllerWorking() {
  106. maxDelayTime := 20 * time.Second
  107. delayTime := time.Second
  108. for {
  109. <-svr.ctl.ClosedDoneCh()
  110. if atomic.LoadUint32(&svr.exit) != 0 {
  111. return
  112. }
  113. for {
  114. log.Info("try to reconnect to server...")
  115. conn, session, err := svr.login()
  116. if err != nil {
  117. log.Warn("reconnect to server error: %v", err)
  118. time.Sleep(delayTime)
  119. delayTime = delayTime * 2
  120. if delayTime > maxDelayTime {
  121. delayTime = maxDelayTime
  122. }
  123. continue
  124. }
  125. // reconnect success, init delayTime
  126. delayTime = time.Second
  127. ctl := NewControl(svr.runId, conn, session, svr.cfg, svr.pxyCfgs, svr.visitorCfgs, svr.serverUDPPort)
  128. ctl.Run()
  129. svr.ctlMu.Lock()
  130. svr.ctl = ctl
  131. svr.ctlMu.Unlock()
  132. break
  133. }
  134. }
  135. }
  136. // login creates a connection to frps and registers it self as a client
  137. // conn: control connection
  138. // session: if it's not nil, using tcp mux
  139. func (svr *Service) login() (conn frpNet.Conn, session *fmux.Session, err error) {
  140. var tlsConfig *tls.Config
  141. if svr.cfg.TLSEnable {
  142. tlsConfig = &tls.Config{
  143. InsecureSkipVerify: true,
  144. }
  145. }
  146. conn, err = frpNet.ConnectServerByProxyWithTLS(svr.cfg.HttpProxy, svr.cfg.Protocol,
  147. fmt.Sprintf("%s:%d", svr.cfg.ServerAddr, svr.cfg.ServerPort), tlsConfig)
  148. if err != nil {
  149. return
  150. }
  151. defer func() {
  152. if err != nil {
  153. conn.Close()
  154. if session != nil {
  155. session.Close()
  156. }
  157. }
  158. }()
  159. if svr.cfg.TcpMux {
  160. fmuxCfg := fmux.DefaultConfig()
  161. fmuxCfg.KeepAliveInterval = 20 * time.Second
  162. fmuxCfg.LogOutput = ioutil.Discard
  163. session, err = fmux.Client(conn, fmuxCfg)
  164. if err != nil {
  165. return
  166. }
  167. stream, errRet := session.OpenStream()
  168. if errRet != nil {
  169. session.Close()
  170. err = errRet
  171. return
  172. }
  173. conn = frpNet.WrapConn(stream)
  174. }
  175. now := time.Now().Unix()
  176. loginMsg := &msg.Login{
  177. Arch: runtime.GOARCH,
  178. Os: runtime.GOOS,
  179. PoolCount: svr.cfg.PoolCount,
  180. User: svr.cfg.User,
  181. Version: version.Full(),
  182. PrivilegeKey: util.GetAuthKey(svr.cfg.Token, now),
  183. Timestamp: now,
  184. RunId: svr.runId,
  185. }
  186. if err = msg.WriteMsg(conn, loginMsg); err != nil {
  187. return
  188. }
  189. var loginRespMsg msg.LoginResp
  190. conn.SetReadDeadline(time.Now().Add(10 * time.Second))
  191. if err = msg.ReadMsgInto(conn, &loginRespMsg); err != nil {
  192. return
  193. }
  194. conn.SetReadDeadline(time.Time{})
  195. if loginRespMsg.Error != "" {
  196. err = fmt.Errorf("%s", loginRespMsg.Error)
  197. log.Error("%s", loginRespMsg.Error)
  198. return
  199. }
  200. svr.runId = loginRespMsg.RunId
  201. svr.serverUDPPort = loginRespMsg.ServerUdpPort
  202. log.Info("login to server success, get run id [%s], server udp port [%d]", loginRespMsg.RunId, loginRespMsg.ServerUdpPort)
  203. return
  204. }
  205. func (svr *Service) ReloadConf(pxyCfgs map[string]config.ProxyConf, visitorCfgs map[string]config.VisitorConf) error {
  206. svr.cfgMu.Lock()
  207. svr.pxyCfgs = pxyCfgs
  208. svr.visitorCfgs = visitorCfgs
  209. svr.cfgMu.Unlock()
  210. return svr.ctl.ReloadConf(pxyCfgs, visitorCfgs)
  211. }
  212. func (svr *Service) Close() {
  213. atomic.StoreUint32(&svr.exit, 1)
  214. svr.ctl.Close()
  215. close(svr.closedCh)
  216. }