control.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652
  1. // Copyright 2017 fatedier, fatedier@gmail.com
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package server
  15. import (
  16. "context"
  17. "fmt"
  18. "io"
  19. "net"
  20. "runtime/debug"
  21. "sync"
  22. "time"
  23. "github.com/fatedier/golib/control/shutdown"
  24. "github.com/fatedier/golib/crypto"
  25. "github.com/fatedier/golib/errors"
  26. "github.com/fatedier/frp/pkg/auth"
  27. "github.com/fatedier/frp/pkg/config"
  28. pkgerr "github.com/fatedier/frp/pkg/errors"
  29. "github.com/fatedier/frp/pkg/msg"
  30. plugin "github.com/fatedier/frp/pkg/plugin/server"
  31. "github.com/fatedier/frp/pkg/transport"
  32. "github.com/fatedier/frp/pkg/util/util"
  33. "github.com/fatedier/frp/pkg/util/version"
  34. "github.com/fatedier/frp/pkg/util/xlog"
  35. "github.com/fatedier/frp/server/controller"
  36. "github.com/fatedier/frp/server/metrics"
  37. "github.com/fatedier/frp/server/proxy"
  38. )
  39. type ControlManager struct {
  40. // controls indexed by run id
  41. ctlsByRunID map[string]*Control
  42. mu sync.RWMutex
  43. }
  44. func NewControlManager() *ControlManager {
  45. return &ControlManager{
  46. ctlsByRunID: make(map[string]*Control),
  47. }
  48. }
  49. func (cm *ControlManager) Add(runID string, ctl *Control) (old *Control) {
  50. cm.mu.Lock()
  51. defer cm.mu.Unlock()
  52. var ok bool
  53. old, ok = cm.ctlsByRunID[runID]
  54. if ok {
  55. old.Replaced(ctl)
  56. }
  57. cm.ctlsByRunID[runID] = ctl
  58. return
  59. }
  60. // we should make sure if it's the same control to prevent delete a new one
  61. func (cm *ControlManager) Del(runID string, ctl *Control) {
  62. cm.mu.Lock()
  63. defer cm.mu.Unlock()
  64. if c, ok := cm.ctlsByRunID[runID]; ok && c == ctl {
  65. delete(cm.ctlsByRunID, runID)
  66. }
  67. }
  68. func (cm *ControlManager) GetByID(runID string) (ctl *Control, ok bool) {
  69. cm.mu.RLock()
  70. defer cm.mu.RUnlock()
  71. ctl, ok = cm.ctlsByRunID[runID]
  72. return
  73. }
  74. func (cm *ControlManager) Close() error {
  75. cm.mu.Lock()
  76. defer cm.mu.Unlock()
  77. for _, ctl := range cm.ctlsByRunID {
  78. ctl.Close()
  79. }
  80. cm.ctlsByRunID = make(map[string]*Control)
  81. return nil
  82. }
  83. type Control struct {
  84. // all resource managers and controllers
  85. rc *controller.ResourceController
  86. // proxy manager
  87. pxyManager *proxy.Manager
  88. // plugin manager
  89. pluginManager *plugin.Manager
  90. // verifies authentication based on selected method
  91. authVerifier auth.Verifier
  92. // other components can use this to communicate with client
  93. msgTransporter transport.MessageTransporter
  94. // login message
  95. loginMsg *msg.Login
  96. // control connection
  97. conn net.Conn
  98. // put a message in this channel to send it over control connection to client
  99. sendCh chan (msg.Message)
  100. // read from this channel to get the next message sent by client
  101. readCh chan (msg.Message)
  102. // work connections
  103. workConnCh chan net.Conn
  104. // proxies in one client
  105. proxies map[string]proxy.Proxy
  106. // pool count
  107. poolCount int
  108. // ports used, for limitations
  109. portsUsedNum int
  110. // last time got the Ping message
  111. lastPing time.Time
  112. // A new run id will be generated when a new client login.
  113. // If run id got from login message has same run id, it means it's the same client, so we can
  114. // replace old controller instantly.
  115. runID string
  116. readerShutdown *shutdown.Shutdown
  117. writerShutdown *shutdown.Shutdown
  118. managerShutdown *shutdown.Shutdown
  119. allShutdown *shutdown.Shutdown
  120. started bool
  121. mu sync.RWMutex
  122. // Server configuration information
  123. serverCfg config.ServerCommonConf
  124. xl *xlog.Logger
  125. ctx context.Context
  126. }
  127. func NewControl(
  128. ctx context.Context,
  129. rc *controller.ResourceController,
  130. pxyManager *proxy.Manager,
  131. pluginManager *plugin.Manager,
  132. authVerifier auth.Verifier,
  133. ctlConn net.Conn,
  134. loginMsg *msg.Login,
  135. serverCfg config.ServerCommonConf,
  136. ) *Control {
  137. poolCount := loginMsg.PoolCount
  138. if poolCount > int(serverCfg.MaxPoolCount) {
  139. poolCount = int(serverCfg.MaxPoolCount)
  140. }
  141. ctl := &Control{
  142. rc: rc,
  143. pxyManager: pxyManager,
  144. pluginManager: pluginManager,
  145. authVerifier: authVerifier,
  146. conn: ctlConn,
  147. loginMsg: loginMsg,
  148. sendCh: make(chan msg.Message, 10),
  149. readCh: make(chan msg.Message, 10),
  150. workConnCh: make(chan net.Conn, poolCount+10),
  151. proxies: make(map[string]proxy.Proxy),
  152. poolCount: poolCount,
  153. portsUsedNum: 0,
  154. lastPing: time.Now(),
  155. runID: loginMsg.RunID,
  156. readerShutdown: shutdown.New(),
  157. writerShutdown: shutdown.New(),
  158. managerShutdown: shutdown.New(),
  159. allShutdown: shutdown.New(),
  160. serverCfg: serverCfg,
  161. xl: xlog.FromContextSafe(ctx),
  162. ctx: ctx,
  163. }
  164. ctl.msgTransporter = transport.NewMessageTransporter(ctl.sendCh)
  165. return ctl
  166. }
  167. // Start send a login success message to client and start working.
  168. func (ctl *Control) Start() {
  169. loginRespMsg := &msg.LoginResp{
  170. Version: version.Full(),
  171. RunID: ctl.runID,
  172. Error: "",
  173. }
  174. _ = msg.WriteMsg(ctl.conn, loginRespMsg)
  175. ctl.mu.Lock()
  176. ctl.started = true
  177. ctl.mu.Unlock()
  178. go ctl.writer()
  179. go func() {
  180. for i := 0; i < ctl.poolCount; i++ {
  181. // ignore error here, that means that this control is closed
  182. _ = errors.PanicToError(func() {
  183. ctl.sendCh <- &msg.ReqWorkConn{}
  184. })
  185. }
  186. }()
  187. go ctl.manager()
  188. go ctl.reader()
  189. go ctl.stoper()
  190. }
  191. func (ctl *Control) Close() error {
  192. ctl.allShutdown.Start()
  193. return nil
  194. }
  195. func (ctl *Control) Replaced(newCtl *Control) {
  196. xl := ctl.xl
  197. xl.Info("Replaced by client [%s]", newCtl.runID)
  198. ctl.runID = ""
  199. ctl.allShutdown.Start()
  200. }
  201. func (ctl *Control) RegisterWorkConn(conn net.Conn) error {
  202. xl := ctl.xl
  203. defer func() {
  204. if err := recover(); err != nil {
  205. xl.Error("panic error: %v", err)
  206. xl.Error(string(debug.Stack()))
  207. }
  208. }()
  209. select {
  210. case ctl.workConnCh <- conn:
  211. xl.Debug("new work connection registered")
  212. return nil
  213. default:
  214. xl.Debug("work connection pool is full, discarding")
  215. return fmt.Errorf("work connection pool is full, discarding")
  216. }
  217. }
  218. // When frps get one user connection, we get one work connection from the pool and return it.
  219. // If no workConn available in the pool, send message to frpc to get one or more
  220. // and wait until it is available.
  221. // return an error if wait timeout
  222. func (ctl *Control) GetWorkConn() (workConn net.Conn, err error) {
  223. xl := ctl.xl
  224. defer func() {
  225. if err := recover(); err != nil {
  226. xl.Error("panic error: %v", err)
  227. xl.Error(string(debug.Stack()))
  228. }
  229. }()
  230. var ok bool
  231. // get a work connection from the pool
  232. select {
  233. case workConn, ok = <-ctl.workConnCh:
  234. if !ok {
  235. err = pkgerr.ErrCtlClosed
  236. return
  237. }
  238. xl.Debug("get work connection from pool")
  239. default:
  240. // no work connections available in the poll, send message to frpc to get more
  241. if err = errors.PanicToError(func() {
  242. ctl.sendCh <- &msg.ReqWorkConn{}
  243. }); err != nil {
  244. return nil, fmt.Errorf("control is already closed")
  245. }
  246. select {
  247. case workConn, ok = <-ctl.workConnCh:
  248. if !ok {
  249. err = pkgerr.ErrCtlClosed
  250. xl.Warn("no work connections available, %v", err)
  251. return
  252. }
  253. case <-time.After(time.Duration(ctl.serverCfg.UserConnTimeout) * time.Second):
  254. err = fmt.Errorf("timeout trying to get work connection")
  255. xl.Warn("%v", err)
  256. return
  257. }
  258. }
  259. // When we get a work connection from pool, replace it with a new one.
  260. _ = errors.PanicToError(func() {
  261. ctl.sendCh <- &msg.ReqWorkConn{}
  262. })
  263. return
  264. }
  265. func (ctl *Control) writer() {
  266. xl := ctl.xl
  267. defer func() {
  268. if err := recover(); err != nil {
  269. xl.Error("panic error: %v", err)
  270. xl.Error(string(debug.Stack()))
  271. }
  272. }()
  273. defer ctl.allShutdown.Start()
  274. defer ctl.writerShutdown.Done()
  275. encWriter, err := crypto.NewWriter(ctl.conn, []byte(ctl.serverCfg.Token))
  276. if err != nil {
  277. xl.Error("crypto new writer error: %v", err)
  278. ctl.allShutdown.Start()
  279. return
  280. }
  281. for {
  282. m, ok := <-ctl.sendCh
  283. if !ok {
  284. xl.Info("control writer is closing")
  285. return
  286. }
  287. if err := msg.WriteMsg(encWriter, m); err != nil {
  288. xl.Warn("write message to control connection error: %v", err)
  289. return
  290. }
  291. }
  292. }
  293. func (ctl *Control) reader() {
  294. xl := ctl.xl
  295. defer func() {
  296. if err := recover(); err != nil {
  297. xl.Error("panic error: %v", err)
  298. xl.Error(string(debug.Stack()))
  299. }
  300. }()
  301. defer ctl.allShutdown.Start()
  302. defer ctl.readerShutdown.Done()
  303. encReader := crypto.NewReader(ctl.conn, []byte(ctl.serverCfg.Token))
  304. for {
  305. m, err := msg.ReadMsg(encReader)
  306. if err != nil {
  307. if err == io.EOF {
  308. xl.Debug("control connection closed")
  309. return
  310. }
  311. xl.Warn("read error: %v", err)
  312. ctl.conn.Close()
  313. return
  314. }
  315. ctl.readCh <- m
  316. }
  317. }
  318. func (ctl *Control) stoper() {
  319. xl := ctl.xl
  320. defer func() {
  321. if err := recover(); err != nil {
  322. xl.Error("panic error: %v", err)
  323. xl.Error(string(debug.Stack()))
  324. }
  325. }()
  326. ctl.allShutdown.WaitStart()
  327. ctl.conn.Close()
  328. ctl.readerShutdown.WaitDone()
  329. close(ctl.readCh)
  330. ctl.managerShutdown.WaitDone()
  331. close(ctl.sendCh)
  332. ctl.writerShutdown.WaitDone()
  333. ctl.mu.Lock()
  334. defer ctl.mu.Unlock()
  335. close(ctl.workConnCh)
  336. for workConn := range ctl.workConnCh {
  337. workConn.Close()
  338. }
  339. for _, pxy := range ctl.proxies {
  340. pxy.Close()
  341. ctl.pxyManager.Del(pxy.GetName())
  342. metrics.Server.CloseProxy(pxy.GetName(), pxy.GetConf().GetBaseConfig().ProxyType)
  343. notifyContent := &plugin.CloseProxyContent{
  344. User: plugin.UserInfo{
  345. User: ctl.loginMsg.User,
  346. Metas: ctl.loginMsg.Metas,
  347. RunID: ctl.loginMsg.RunID,
  348. },
  349. CloseProxy: msg.CloseProxy{
  350. ProxyName: pxy.GetName(),
  351. },
  352. }
  353. go func() {
  354. _ = ctl.pluginManager.CloseProxy(notifyContent)
  355. }()
  356. }
  357. ctl.allShutdown.Done()
  358. xl.Info("client exit success")
  359. metrics.Server.CloseClient()
  360. }
  361. // block until Control closed
  362. func (ctl *Control) WaitClosed() {
  363. ctl.mu.RLock()
  364. started := ctl.started
  365. ctl.mu.RUnlock()
  366. if !started {
  367. ctl.allShutdown.Done()
  368. return
  369. }
  370. ctl.allShutdown.WaitDone()
  371. }
  372. func (ctl *Control) manager() {
  373. xl := ctl.xl
  374. defer func() {
  375. if err := recover(); err != nil {
  376. xl.Error("panic error: %v", err)
  377. xl.Error(string(debug.Stack()))
  378. }
  379. }()
  380. defer ctl.allShutdown.Start()
  381. defer ctl.managerShutdown.Done()
  382. var heartbeatCh <-chan time.Time
  383. // Don't need application heartbeat if TCPMux is enabled,
  384. // yamux will do same thing.
  385. if !ctl.serverCfg.TCPMux && ctl.serverCfg.HeartbeatTimeout > 0 {
  386. heartbeat := time.NewTicker(time.Second)
  387. defer heartbeat.Stop()
  388. heartbeatCh = heartbeat.C
  389. }
  390. for {
  391. select {
  392. case <-heartbeatCh:
  393. if time.Since(ctl.lastPing) > time.Duration(ctl.serverCfg.HeartbeatTimeout)*time.Second {
  394. xl.Warn("heartbeat timeout")
  395. return
  396. }
  397. case rawMsg, ok := <-ctl.readCh:
  398. if !ok {
  399. return
  400. }
  401. switch m := rawMsg.(type) {
  402. case *msg.NewProxy:
  403. content := &plugin.NewProxyContent{
  404. User: plugin.UserInfo{
  405. User: ctl.loginMsg.User,
  406. Metas: ctl.loginMsg.Metas,
  407. RunID: ctl.loginMsg.RunID,
  408. },
  409. NewProxy: *m,
  410. }
  411. var remoteAddr string
  412. retContent, err := ctl.pluginManager.NewProxy(content)
  413. if err == nil {
  414. m = &retContent.NewProxy
  415. remoteAddr, err = ctl.RegisterProxy(m)
  416. }
  417. // register proxy in this control
  418. resp := &msg.NewProxyResp{
  419. ProxyName: m.ProxyName,
  420. }
  421. if err != nil {
  422. xl.Warn("new proxy [%s] type [%s] error: %v", m.ProxyName, m.ProxyType, err)
  423. resp.Error = util.GenerateResponseErrorString(fmt.Sprintf("new proxy [%s] error", m.ProxyName), err, ctl.serverCfg.DetailedErrorsToClient)
  424. } else {
  425. resp.RemoteAddr = remoteAddr
  426. xl.Info("new proxy [%s] type [%s] success", m.ProxyName, m.ProxyType)
  427. metrics.Server.NewProxy(m.ProxyName, m.ProxyType)
  428. }
  429. ctl.sendCh <- resp
  430. case *msg.NatHoleVisitor:
  431. go ctl.HandleNatHoleVisitor(m)
  432. case *msg.NatHoleClient:
  433. go ctl.HandleNatHoleClient(m)
  434. case *msg.NatHoleReport:
  435. go ctl.HandleNatHoleReport(m)
  436. case *msg.CloseProxy:
  437. _ = ctl.CloseProxy(m)
  438. xl.Info("close proxy [%s] success", m.ProxyName)
  439. case *msg.Ping:
  440. content := &plugin.PingContent{
  441. User: plugin.UserInfo{
  442. User: ctl.loginMsg.User,
  443. Metas: ctl.loginMsg.Metas,
  444. RunID: ctl.loginMsg.RunID,
  445. },
  446. Ping: *m,
  447. }
  448. retContent, err := ctl.pluginManager.Ping(content)
  449. if err == nil {
  450. m = &retContent.Ping
  451. err = ctl.authVerifier.VerifyPing(m)
  452. }
  453. if err != nil {
  454. xl.Warn("received invalid ping: %v", err)
  455. ctl.sendCh <- &msg.Pong{
  456. Error: util.GenerateResponseErrorString("invalid ping", err, ctl.serverCfg.DetailedErrorsToClient),
  457. }
  458. return
  459. }
  460. ctl.lastPing = time.Now()
  461. xl.Debug("receive heartbeat")
  462. ctl.sendCh <- &msg.Pong{}
  463. }
  464. }
  465. }
  466. }
  467. func (ctl *Control) HandleNatHoleVisitor(m *msg.NatHoleVisitor) {
  468. ctl.rc.NatHoleController.HandleVisitor(m, ctl.msgTransporter, ctl.loginMsg.User)
  469. }
  470. func (ctl *Control) HandleNatHoleClient(m *msg.NatHoleClient) {
  471. ctl.rc.NatHoleController.HandleClient(m, ctl.msgTransporter)
  472. }
  473. func (ctl *Control) HandleNatHoleReport(m *msg.NatHoleReport) {
  474. ctl.rc.NatHoleController.HandleReport(m)
  475. }
  476. func (ctl *Control) RegisterProxy(pxyMsg *msg.NewProxy) (remoteAddr string, err error) {
  477. var pxyConf config.ProxyConf
  478. // Load configures from NewProxy message and validate.
  479. pxyConf, err = config.NewProxyConfFromMsg(pxyMsg, ctl.serverCfg)
  480. if err != nil {
  481. return
  482. }
  483. // User info
  484. userInfo := plugin.UserInfo{
  485. User: ctl.loginMsg.User,
  486. Metas: ctl.loginMsg.Metas,
  487. RunID: ctl.runID,
  488. }
  489. // NewProxy will return an interface Proxy.
  490. // In fact, it creates different proxies based on the proxy type. We just call run() here.
  491. pxy, err := proxy.NewProxy(ctl.ctx, userInfo, ctl.rc, ctl.poolCount, ctl.GetWorkConn, pxyConf, ctl.serverCfg, ctl.loginMsg)
  492. if err != nil {
  493. return remoteAddr, err
  494. }
  495. // Check ports used number in each client
  496. if ctl.serverCfg.MaxPortsPerClient > 0 {
  497. ctl.mu.Lock()
  498. if ctl.portsUsedNum+pxy.GetUsedPortsNum() > int(ctl.serverCfg.MaxPortsPerClient) {
  499. ctl.mu.Unlock()
  500. err = fmt.Errorf("exceed the max_ports_per_client")
  501. return
  502. }
  503. ctl.portsUsedNum += pxy.GetUsedPortsNum()
  504. ctl.mu.Unlock()
  505. defer func() {
  506. if err != nil {
  507. ctl.mu.Lock()
  508. ctl.portsUsedNum -= pxy.GetUsedPortsNum()
  509. ctl.mu.Unlock()
  510. }
  511. }()
  512. }
  513. if ctl.pxyManager.Exist(pxyMsg.ProxyName) {
  514. err = fmt.Errorf("proxy [%s] already exists", pxyMsg.ProxyName)
  515. return
  516. }
  517. remoteAddr, err = pxy.Run()
  518. if err != nil {
  519. return
  520. }
  521. defer func() {
  522. if err != nil {
  523. pxy.Close()
  524. }
  525. }()
  526. err = ctl.pxyManager.Add(pxyMsg.ProxyName, pxy)
  527. if err != nil {
  528. return
  529. }
  530. ctl.mu.Lock()
  531. ctl.proxies[pxy.GetName()] = pxy
  532. ctl.mu.Unlock()
  533. return
  534. }
  535. func (ctl *Control) CloseProxy(closeMsg *msg.CloseProxy) (err error) {
  536. ctl.mu.Lock()
  537. pxy, ok := ctl.proxies[closeMsg.ProxyName]
  538. if !ok {
  539. ctl.mu.Unlock()
  540. return
  541. }
  542. if ctl.serverCfg.MaxPortsPerClient > 0 {
  543. ctl.portsUsedNum -= pxy.GetUsedPortsNum()
  544. }
  545. pxy.Close()
  546. ctl.pxyManager.Del(pxy.GetName())
  547. delete(ctl.proxies, closeMsg.ProxyName)
  548. ctl.mu.Unlock()
  549. metrics.Server.CloseProxy(pxy.GetName(), pxy.GetConf().GetBaseConfig().ProxyType)
  550. notifyContent := &plugin.CloseProxyContent{
  551. User: plugin.UserInfo{
  552. User: ctl.loginMsg.User,
  553. Metas: ctl.loginMsg.Metas,
  554. RunID: ctl.loginMsg.RunID,
  555. },
  556. CloseProxy: msg.CloseProxy{
  557. ProxyName: pxy.GetName(),
  558. },
  559. }
  560. go func() {
  561. _ = ctl.pluginManager.CloseProxy(notifyContent)
  562. }()
  563. return
  564. }