1
0

control.go 9.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367
  1. // Copyright 2017 fatedier, fatedier@gmail.com
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package client
  15. import (
  16. "context"
  17. "crypto/tls"
  18. "fmt"
  19. "io"
  20. "net"
  21. "runtime/debug"
  22. "sync"
  23. "time"
  24. "github.com/fatedier/frp/client/proxy"
  25. "github.com/fatedier/frp/models/auth"
  26. "github.com/fatedier/frp/models/config"
  27. "github.com/fatedier/frp/models/msg"
  28. frpNet "github.com/fatedier/frp/utils/net"
  29. "github.com/fatedier/frp/utils/xlog"
  30. "github.com/fatedier/golib/control/shutdown"
  31. "github.com/fatedier/golib/crypto"
  32. fmux "github.com/hashicorp/yamux"
  33. )
  34. type Control struct {
  35. // uniq id got from frps, attach it in loginMsg
  36. runId string
  37. // manage all proxies
  38. pxyCfgs map[string]config.ProxyConf
  39. pm *proxy.ProxyManager
  40. // manage all visitors
  41. vm *VisitorManager
  42. // control connection
  43. conn net.Conn
  44. // tcp stream multiplexing, if enabled
  45. session *fmux.Session
  46. // put a message in this channel to send it over control connection to server
  47. sendCh chan (msg.Message)
  48. // read from this channel to get the next message sent by server
  49. readCh chan (msg.Message)
  50. // goroutines can block by reading from this channel, it will be closed only in reader() when control connection is closed
  51. closedCh chan struct{}
  52. closedDoneCh chan struct{}
  53. // last time got the Pong message
  54. lastPong time.Time
  55. // The client configuration
  56. clientCfg config.ClientCommonConf
  57. readerShutdown *shutdown.Shutdown
  58. writerShutdown *shutdown.Shutdown
  59. msgHandlerShutdown *shutdown.Shutdown
  60. // The UDP port that the server is listening on
  61. serverUDPPort int
  62. mu sync.RWMutex
  63. xl *xlog.Logger
  64. // service context
  65. ctx context.Context
  66. // sets authentication based on selected method
  67. authSetter auth.Setter
  68. }
  69. func NewControl(ctx context.Context, runId string, conn net.Conn, session *fmux.Session,
  70. clientCfg config.ClientCommonConf,
  71. pxyCfgs map[string]config.ProxyConf,
  72. visitorCfgs map[string]config.VisitorConf,
  73. serverUDPPort int,
  74. authSetter auth.Setter) *Control {
  75. // new xlog instance
  76. ctl := &Control{
  77. runId: runId,
  78. conn: conn,
  79. session: session,
  80. pxyCfgs: pxyCfgs,
  81. sendCh: make(chan msg.Message, 100),
  82. readCh: make(chan msg.Message, 100),
  83. closedCh: make(chan struct{}),
  84. closedDoneCh: make(chan struct{}),
  85. clientCfg: clientCfg,
  86. readerShutdown: shutdown.New(),
  87. writerShutdown: shutdown.New(),
  88. msgHandlerShutdown: shutdown.New(),
  89. serverUDPPort: serverUDPPort,
  90. xl: xlog.FromContextSafe(ctx),
  91. ctx: ctx,
  92. authSetter: authSetter,
  93. }
  94. ctl.pm = proxy.NewProxyManager(ctl.ctx, ctl.sendCh, clientCfg, serverUDPPort)
  95. ctl.vm = NewVisitorManager(ctl.ctx, ctl)
  96. ctl.vm.Reload(visitorCfgs)
  97. return ctl
  98. }
  99. func (ctl *Control) Run() {
  100. go ctl.worker()
  101. // start all proxies
  102. ctl.pm.Reload(ctl.pxyCfgs)
  103. // start all visitors
  104. go ctl.vm.Run()
  105. return
  106. }
  107. func (ctl *Control) HandleReqWorkConn(inMsg *msg.ReqWorkConn) {
  108. xl := ctl.xl
  109. workConn, err := ctl.connectServer()
  110. if err != nil {
  111. return
  112. }
  113. m := &msg.NewWorkConn{
  114. RunId: ctl.runId,
  115. }
  116. if err = ctl.authSetter.SetNewWorkConn(m); err != nil {
  117. xl.Warn("error during NewWorkConn authentication: %v", err)
  118. return
  119. }
  120. if err = msg.WriteMsg(workConn, m); err != nil {
  121. xl.Warn("work connection write to server error: %v", err)
  122. workConn.Close()
  123. return
  124. }
  125. var startMsg msg.StartWorkConn
  126. if err = msg.ReadMsgInto(workConn, &startMsg); err != nil {
  127. xl.Error("work connection closed before response StartWorkConn message: %v", err)
  128. workConn.Close()
  129. return
  130. }
  131. if startMsg.Error != "" {
  132. xl.Error("StartWorkConn contains error: %s", startMsg.Error)
  133. workConn.Close()
  134. return
  135. }
  136. // dispatch this work connection to related proxy
  137. ctl.pm.HandleWorkConn(startMsg.ProxyName, workConn, &startMsg)
  138. }
  139. func (ctl *Control) HandleNewProxyResp(inMsg *msg.NewProxyResp) {
  140. xl := ctl.xl
  141. // Server will return NewProxyResp message to each NewProxy message.
  142. // Start a new proxy handler if no error got
  143. err := ctl.pm.StartProxy(inMsg.ProxyName, inMsg.RemoteAddr, inMsg.Error)
  144. if err != nil {
  145. xl.Warn("[%s] start error: %v", inMsg.ProxyName, err)
  146. } else {
  147. xl.Info("[%s] start proxy success", inMsg.ProxyName)
  148. }
  149. }
  150. func (ctl *Control) Close() error {
  151. ctl.pm.Close()
  152. ctl.conn.Close()
  153. if ctl.session != nil {
  154. ctl.session.Close()
  155. }
  156. return nil
  157. }
  158. // ClosedDoneCh returns a channel which will be closed after all resources are released
  159. func (ctl *Control) ClosedDoneCh() <-chan struct{} {
  160. return ctl.closedDoneCh
  161. }
  162. // connectServer return a new connection to frps
  163. func (ctl *Control) connectServer() (conn net.Conn, err error) {
  164. xl := ctl.xl
  165. if ctl.clientCfg.TcpMux {
  166. stream, errRet := ctl.session.OpenStream()
  167. if errRet != nil {
  168. err = errRet
  169. xl.Warn("start new connection to server error: %v", err)
  170. return
  171. }
  172. conn = stream
  173. } else {
  174. var tlsConfig *tls.Config
  175. if ctl.clientCfg.TLSEnable {
  176. tlsConfig = &tls.Config{
  177. InsecureSkipVerify: true,
  178. }
  179. }
  180. conn, err = frpNet.ConnectServerByProxyWithTLS(ctl.clientCfg.HttpProxy, ctl.clientCfg.Protocol,
  181. fmt.Sprintf("%s:%d", ctl.clientCfg.ServerAddr, ctl.clientCfg.ServerPort), tlsConfig)
  182. if err != nil {
  183. xl.Warn("start new connection to server error: %v", err)
  184. return
  185. }
  186. }
  187. return
  188. }
  189. // reader read all messages from frps and send to readCh
  190. func (ctl *Control) reader() {
  191. xl := ctl.xl
  192. defer func() {
  193. if err := recover(); err != nil {
  194. xl.Error("panic error: %v", err)
  195. xl.Error(string(debug.Stack()))
  196. }
  197. }()
  198. defer ctl.readerShutdown.Done()
  199. defer close(ctl.closedCh)
  200. encReader := crypto.NewReader(ctl.conn, []byte(ctl.clientCfg.Token))
  201. for {
  202. if m, err := msg.ReadMsg(encReader); err != nil {
  203. if err == io.EOF {
  204. xl.Debug("read from control connection EOF")
  205. return
  206. } else {
  207. xl.Warn("read error: %v", err)
  208. ctl.conn.Close()
  209. return
  210. }
  211. } else {
  212. ctl.readCh <- m
  213. }
  214. }
  215. }
  216. // writer writes messages got from sendCh to frps
  217. func (ctl *Control) writer() {
  218. xl := ctl.xl
  219. defer ctl.writerShutdown.Done()
  220. encWriter, err := crypto.NewWriter(ctl.conn, []byte(ctl.clientCfg.Token))
  221. if err != nil {
  222. xl.Error("crypto new writer error: %v", err)
  223. ctl.conn.Close()
  224. return
  225. }
  226. for {
  227. if m, ok := <-ctl.sendCh; !ok {
  228. xl.Info("control writer is closing")
  229. return
  230. } else {
  231. if err := msg.WriteMsg(encWriter, m); err != nil {
  232. xl.Warn("write message to control connection error: %v", err)
  233. return
  234. }
  235. }
  236. }
  237. }
  238. // msgHandler handles all channel events and do corresponding operations.
  239. func (ctl *Control) msgHandler() {
  240. xl := ctl.xl
  241. defer func() {
  242. if err := recover(); err != nil {
  243. xl.Error("panic error: %v", err)
  244. xl.Error(string(debug.Stack()))
  245. }
  246. }()
  247. defer ctl.msgHandlerShutdown.Done()
  248. hbSend := time.NewTicker(time.Duration(ctl.clientCfg.HeartBeatInterval) * time.Second)
  249. defer hbSend.Stop()
  250. hbCheck := time.NewTicker(time.Second)
  251. defer hbCheck.Stop()
  252. ctl.lastPong = time.Now()
  253. for {
  254. select {
  255. case <-hbSend.C:
  256. // send heartbeat to server
  257. xl.Debug("send heartbeat to server")
  258. pingMsg := &msg.Ping{}
  259. if err := ctl.authSetter.SetPing(pingMsg); err != nil {
  260. xl.Warn("error during ping authentication: %v", err)
  261. return
  262. }
  263. ctl.sendCh <- pingMsg
  264. case <-hbCheck.C:
  265. if time.Since(ctl.lastPong) > time.Duration(ctl.clientCfg.HeartBeatTimeout)*time.Second {
  266. xl.Warn("heartbeat timeout")
  267. // let reader() stop
  268. ctl.conn.Close()
  269. return
  270. }
  271. case rawMsg, ok := <-ctl.readCh:
  272. if !ok {
  273. return
  274. }
  275. switch m := rawMsg.(type) {
  276. case *msg.ReqWorkConn:
  277. go ctl.HandleReqWorkConn(m)
  278. case *msg.NewProxyResp:
  279. ctl.HandleNewProxyResp(m)
  280. case *msg.Pong:
  281. if m.Error != "" {
  282. xl.Error("Pong contains error: %s", m.Error)
  283. ctl.conn.Close()
  284. return
  285. }
  286. ctl.lastPong = time.Now()
  287. xl.Debug("receive heartbeat from server")
  288. }
  289. }
  290. }
  291. }
  292. // If controler is notified by closedCh, reader and writer and handler will exit
  293. func (ctl *Control) worker() {
  294. go ctl.msgHandler()
  295. go ctl.reader()
  296. go ctl.writer()
  297. select {
  298. case <-ctl.closedCh:
  299. // close related channels and wait until other goroutines done
  300. close(ctl.readCh)
  301. ctl.readerShutdown.WaitDone()
  302. ctl.msgHandlerShutdown.WaitDone()
  303. close(ctl.sendCh)
  304. ctl.writerShutdown.WaitDone()
  305. ctl.pm.Close()
  306. ctl.vm.Close()
  307. close(ctl.closedDoneCh)
  308. if ctl.session != nil {
  309. ctl.session.Close()
  310. }
  311. return
  312. }
  313. }
  314. func (ctl *Control) ReloadConf(pxyCfgs map[string]config.ProxyConf, visitorCfgs map[string]config.VisitorConf) error {
  315. ctl.vm.Reload(visitorCfgs)
  316. ctl.pm.Reload(pxyCfgs)
  317. return nil
  318. }