1
0

service.go 6.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274
  1. // Copyright 2017 fatedier, fatedier@gmail.com
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package client
  15. import (
  16. "context"
  17. "crypto/tls"
  18. "fmt"
  19. "io/ioutil"
  20. "net"
  21. "runtime"
  22. "sync"
  23. "sync/atomic"
  24. "time"
  25. "github.com/fatedier/frp/assets"
  26. "github.com/fatedier/frp/models/auth"
  27. "github.com/fatedier/frp/models/config"
  28. "github.com/fatedier/frp/models/msg"
  29. "github.com/fatedier/frp/utils/log"
  30. frpNet "github.com/fatedier/frp/utils/net"
  31. "github.com/fatedier/frp/utils/version"
  32. "github.com/fatedier/frp/utils/xlog"
  33. fmux "github.com/hashicorp/yamux"
  34. )
  35. // Service is a client service.
  36. type Service struct {
  37. // uniq id got from frps, attach it in loginMsg
  38. runId string
  39. // manager control connection with server
  40. ctl *Control
  41. ctlMu sync.RWMutex
  42. // Sets authentication based on selected method
  43. authSetter auth.Setter
  44. cfg config.ClientCommonConf
  45. pxyCfgs map[string]config.ProxyConf
  46. visitorCfgs map[string]config.VisitorConf
  47. cfgMu sync.RWMutex
  48. // The configuration file used to initialize this client, or an empty
  49. // string if no configuration file was used.
  50. cfgFile string
  51. // This is configured by the login response from frps
  52. serverUDPPort int
  53. exit uint32 // 0 means not exit
  54. // service context
  55. ctx context.Context
  56. // call cancel to stop service
  57. cancel context.CancelFunc
  58. }
  59. func NewService(cfg config.ClientCommonConf, pxyCfgs map[string]config.ProxyConf, visitorCfgs map[string]config.VisitorConf, cfgFile string) (svr *Service, err error) {
  60. ctx, cancel := context.WithCancel(context.Background())
  61. svr = &Service{
  62. authSetter: auth.NewAuthSetter(cfg.AuthClientConfig),
  63. cfg: cfg,
  64. cfgFile: cfgFile,
  65. pxyCfgs: pxyCfgs,
  66. visitorCfgs: visitorCfgs,
  67. exit: 0,
  68. ctx: xlog.NewContext(ctx, xlog.New()),
  69. cancel: cancel,
  70. }
  71. return
  72. }
  73. func (svr *Service) GetController() *Control {
  74. svr.ctlMu.RLock()
  75. defer svr.ctlMu.RUnlock()
  76. return svr.ctl
  77. }
  78. func (svr *Service) Run() error {
  79. xl := xlog.FromContextSafe(svr.ctx)
  80. // login to frps
  81. for {
  82. conn, session, err := svr.login()
  83. if err != nil {
  84. xl.Warn("login to server failed: %v", err)
  85. // if login_fail_exit is true, just exit this program
  86. // otherwise sleep a while and try again to connect to server
  87. if svr.cfg.LoginFailExit {
  88. return err
  89. } else {
  90. time.Sleep(10 * time.Second)
  91. }
  92. } else {
  93. // login success
  94. ctl := NewControl(svr.ctx, svr.runId, conn, session, svr.cfg, svr.pxyCfgs, svr.visitorCfgs, svr.serverUDPPort, svr.authSetter)
  95. ctl.Run()
  96. svr.ctlMu.Lock()
  97. svr.ctl = ctl
  98. svr.ctlMu.Unlock()
  99. break
  100. }
  101. }
  102. go svr.keepControllerWorking()
  103. if svr.cfg.AdminPort != 0 {
  104. // Init admin server assets
  105. err := assets.Load(svr.cfg.AssetsDir)
  106. if err != nil {
  107. return fmt.Errorf("Load assets error: %v", err)
  108. }
  109. err = svr.RunAdminServer(svr.cfg.AdminAddr, svr.cfg.AdminPort)
  110. if err != nil {
  111. log.Warn("run admin server error: %v", err)
  112. }
  113. log.Info("admin server listen on %s:%d", svr.cfg.AdminAddr, svr.cfg.AdminPort)
  114. }
  115. <-svr.ctx.Done()
  116. return nil
  117. }
  118. func (svr *Service) keepControllerWorking() {
  119. xl := xlog.FromContextSafe(svr.ctx)
  120. maxDelayTime := 20 * time.Second
  121. delayTime := time.Second
  122. for {
  123. <-svr.ctl.ClosedDoneCh()
  124. if atomic.LoadUint32(&svr.exit) != 0 {
  125. return
  126. }
  127. for {
  128. xl.Info("try to reconnect to server...")
  129. conn, session, err := svr.login()
  130. if err != nil {
  131. xl.Warn("reconnect to server error: %v", err)
  132. time.Sleep(delayTime)
  133. delayTime = delayTime * 2
  134. if delayTime > maxDelayTime {
  135. delayTime = maxDelayTime
  136. }
  137. continue
  138. }
  139. // reconnect success, init delayTime
  140. delayTime = time.Second
  141. ctl := NewControl(svr.ctx, svr.runId, conn, session, svr.cfg, svr.pxyCfgs, svr.visitorCfgs, svr.serverUDPPort, svr.authSetter)
  142. ctl.Run()
  143. svr.ctlMu.Lock()
  144. svr.ctl = ctl
  145. svr.ctlMu.Unlock()
  146. break
  147. }
  148. }
  149. }
  150. // login creates a connection to frps and registers it self as a client
  151. // conn: control connection
  152. // session: if it's not nil, using tcp mux
  153. func (svr *Service) login() (conn net.Conn, session *fmux.Session, err error) {
  154. xl := xlog.FromContextSafe(svr.ctx)
  155. var tlsConfig *tls.Config
  156. if svr.cfg.TLSEnable {
  157. tlsConfig = &tls.Config{
  158. InsecureSkipVerify: true,
  159. }
  160. }
  161. conn, err = frpNet.ConnectServerByProxyWithTLS(svr.cfg.HttpProxy, svr.cfg.Protocol,
  162. fmt.Sprintf("%s:%d", svr.cfg.ServerAddr, svr.cfg.ServerPort), tlsConfig)
  163. if err != nil {
  164. return
  165. }
  166. defer func() {
  167. if err != nil {
  168. conn.Close()
  169. if session != nil {
  170. session.Close()
  171. }
  172. }
  173. }()
  174. if svr.cfg.TcpMux {
  175. fmuxCfg := fmux.DefaultConfig()
  176. fmuxCfg.KeepAliveInterval = 20 * time.Second
  177. fmuxCfg.LogOutput = ioutil.Discard
  178. session, err = fmux.Client(conn, fmuxCfg)
  179. if err != nil {
  180. return
  181. }
  182. stream, errRet := session.OpenStream()
  183. if errRet != nil {
  184. session.Close()
  185. err = errRet
  186. return
  187. }
  188. conn = stream
  189. }
  190. loginMsg := &msg.Login{
  191. Arch: runtime.GOARCH,
  192. Os: runtime.GOOS,
  193. PoolCount: svr.cfg.PoolCount,
  194. User: svr.cfg.User,
  195. Version: version.Full(),
  196. Timestamp: time.Now().Unix(),
  197. RunId: svr.runId,
  198. Metas: svr.cfg.Metas,
  199. }
  200. // Add auth
  201. if err = svr.authSetter.SetLogin(loginMsg); err != nil {
  202. return
  203. }
  204. if err = msg.WriteMsg(conn, loginMsg); err != nil {
  205. return
  206. }
  207. var loginRespMsg msg.LoginResp
  208. conn.SetReadDeadline(time.Now().Add(10 * time.Second))
  209. if err = msg.ReadMsgInto(conn, &loginRespMsg); err != nil {
  210. return
  211. }
  212. conn.SetReadDeadline(time.Time{})
  213. if loginRespMsg.Error != "" {
  214. err = fmt.Errorf("%s", loginRespMsg.Error)
  215. xl.Error("%s", loginRespMsg.Error)
  216. return
  217. }
  218. svr.runId = loginRespMsg.RunId
  219. xl.ResetPrefixes()
  220. xl.AppendPrefix(svr.runId)
  221. svr.serverUDPPort = loginRespMsg.ServerUdpPort
  222. xl.Info("login to server success, get run id [%s], server udp port [%d]", loginRespMsg.RunId, loginRespMsg.ServerUdpPort)
  223. return
  224. }
  225. func (svr *Service) ReloadConf(pxyCfgs map[string]config.ProxyConf, visitorCfgs map[string]config.VisitorConf) error {
  226. svr.cfgMu.Lock()
  227. svr.pxyCfgs = pxyCfgs
  228. svr.visitorCfgs = visitorCfgs
  229. svr.cfgMu.Unlock()
  230. return svr.ctl.ReloadConf(pxyCfgs, visitorCfgs)
  231. }
  232. func (svr *Service) Close() {
  233. atomic.StoreUint32(&svr.exit, 1)
  234. svr.ctl.Close()
  235. svr.cancel()
  236. }