visitor.go 7.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330
  1. // Copyright 2017 fatedier, fatedier@gmail.com
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package client
  15. import (
  16. "bytes"
  17. "context"
  18. "fmt"
  19. "io"
  20. "io/ioutil"
  21. "net"
  22. "sync"
  23. "time"
  24. "github.com/fatedier/frp/models/config"
  25. "github.com/fatedier/frp/models/msg"
  26. frpNet "github.com/fatedier/frp/utils/net"
  27. "github.com/fatedier/frp/utils/util"
  28. "github.com/fatedier/frp/utils/xlog"
  29. frpIo "github.com/fatedier/golib/io"
  30. "github.com/fatedier/golib/pool"
  31. fmux "github.com/hashicorp/yamux"
  32. )
  33. // Visitor is used for forward traffics from local port tot remote service.
  34. type Visitor interface {
  35. Run() error
  36. Close()
  37. }
  38. func NewVisitor(ctx context.Context, ctl *Control, cfg config.VisitorConf) (visitor Visitor) {
  39. xl := xlog.FromContextSafe(ctx).Spawn().AppendPrefix(cfg.GetBaseInfo().ProxyName)
  40. baseVisitor := BaseVisitor{
  41. ctl: ctl,
  42. ctx: xlog.NewContext(ctx, xl),
  43. }
  44. switch cfg := cfg.(type) {
  45. case *config.StcpVisitorConf:
  46. visitor = &StcpVisitor{
  47. BaseVisitor: &baseVisitor,
  48. cfg: cfg,
  49. }
  50. case *config.XtcpVisitorConf:
  51. visitor = &XtcpVisitor{
  52. BaseVisitor: &baseVisitor,
  53. cfg: cfg,
  54. }
  55. }
  56. return
  57. }
  58. type BaseVisitor struct {
  59. ctl *Control
  60. l net.Listener
  61. closed bool
  62. mu sync.RWMutex
  63. ctx context.Context
  64. }
  65. type StcpVisitor struct {
  66. *BaseVisitor
  67. cfg *config.StcpVisitorConf
  68. }
  69. func (sv *StcpVisitor) Run() (err error) {
  70. sv.l, err = net.Listen("tcp", fmt.Sprintf("%s:%d", sv.cfg.BindAddr, sv.cfg.BindPort))
  71. if err != nil {
  72. return
  73. }
  74. go sv.worker()
  75. return
  76. }
  77. func (sv *StcpVisitor) Close() {
  78. sv.l.Close()
  79. }
  80. func (sv *StcpVisitor) worker() {
  81. xl := xlog.FromContextSafe(sv.ctx)
  82. for {
  83. conn, err := sv.l.Accept()
  84. if err != nil {
  85. xl.Warn("stcp local listener closed")
  86. return
  87. }
  88. go sv.handleConn(conn)
  89. }
  90. }
  91. func (sv *StcpVisitor) handleConn(userConn net.Conn) {
  92. xl := xlog.FromContextSafe(sv.ctx)
  93. defer userConn.Close()
  94. xl.Debug("get a new stcp user connection")
  95. visitorConn, err := sv.ctl.connectServer()
  96. if err != nil {
  97. return
  98. }
  99. defer visitorConn.Close()
  100. now := time.Now().Unix()
  101. newVisitorConnMsg := &msg.NewVisitorConn{
  102. ProxyName: sv.cfg.ServerName,
  103. SignKey: util.GetAuthKey(sv.cfg.Sk, now),
  104. Timestamp: now,
  105. UseEncryption: sv.cfg.UseEncryption,
  106. UseCompression: sv.cfg.UseCompression,
  107. }
  108. err = msg.WriteMsg(visitorConn, newVisitorConnMsg)
  109. if err != nil {
  110. xl.Warn("send newVisitorConnMsg to server error: %v", err)
  111. return
  112. }
  113. var newVisitorConnRespMsg msg.NewVisitorConnResp
  114. visitorConn.SetReadDeadline(time.Now().Add(10 * time.Second))
  115. err = msg.ReadMsgInto(visitorConn, &newVisitorConnRespMsg)
  116. if err != nil {
  117. xl.Warn("get newVisitorConnRespMsg error: %v", err)
  118. return
  119. }
  120. visitorConn.SetReadDeadline(time.Time{})
  121. if newVisitorConnRespMsg.Error != "" {
  122. xl.Warn("start new visitor connection error: %s", newVisitorConnRespMsg.Error)
  123. return
  124. }
  125. var remote io.ReadWriteCloser
  126. remote = visitorConn
  127. if sv.cfg.UseEncryption {
  128. remote, err = frpIo.WithEncryption(remote, []byte(sv.cfg.Sk))
  129. if err != nil {
  130. xl.Error("create encryption stream error: %v", err)
  131. return
  132. }
  133. }
  134. if sv.cfg.UseCompression {
  135. remote = frpIo.WithCompression(remote)
  136. }
  137. frpIo.Join(userConn, remote)
  138. }
  139. type XtcpVisitor struct {
  140. *BaseVisitor
  141. cfg *config.XtcpVisitorConf
  142. }
  143. func (sv *XtcpVisitor) Run() (err error) {
  144. sv.l, err = net.Listen("tcp", fmt.Sprintf("%s:%d", sv.cfg.BindAddr, sv.cfg.BindPort))
  145. if err != nil {
  146. return
  147. }
  148. go sv.worker()
  149. return
  150. }
  151. func (sv *XtcpVisitor) Close() {
  152. sv.l.Close()
  153. }
  154. func (sv *XtcpVisitor) worker() {
  155. xl := xlog.FromContextSafe(sv.ctx)
  156. for {
  157. conn, err := sv.l.Accept()
  158. if err != nil {
  159. xl.Warn("xtcp local listener closed")
  160. return
  161. }
  162. go sv.handleConn(conn)
  163. }
  164. }
  165. func (sv *XtcpVisitor) handleConn(userConn net.Conn) {
  166. xl := xlog.FromContextSafe(sv.ctx)
  167. defer userConn.Close()
  168. xl.Debug("get a new xtcp user connection")
  169. if sv.ctl.serverUDPPort == 0 {
  170. xl.Error("xtcp is not supported by server")
  171. return
  172. }
  173. raddr, err := net.ResolveUDPAddr("udp",
  174. fmt.Sprintf("%s:%d", sv.ctl.clientCfg.ServerAddr, sv.ctl.serverUDPPort))
  175. if err != nil {
  176. xl.Error("resolve server UDP addr error")
  177. return
  178. }
  179. visitorConn, err := net.DialUDP("udp", nil, raddr)
  180. if err != nil {
  181. xl.Warn("dial server udp addr error: %v", err)
  182. return
  183. }
  184. defer visitorConn.Close()
  185. now := time.Now().Unix()
  186. natHoleVisitorMsg := &msg.NatHoleVisitor{
  187. ProxyName: sv.cfg.ServerName,
  188. SignKey: util.GetAuthKey(sv.cfg.Sk, now),
  189. Timestamp: now,
  190. }
  191. err = msg.WriteMsg(visitorConn, natHoleVisitorMsg)
  192. if err != nil {
  193. xl.Warn("send natHoleVisitorMsg to server error: %v", err)
  194. return
  195. }
  196. // Wait for client address at most 10 seconds.
  197. var natHoleRespMsg msg.NatHoleResp
  198. visitorConn.SetReadDeadline(time.Now().Add(10 * time.Second))
  199. buf := pool.GetBuf(1024)
  200. n, err := visitorConn.Read(buf)
  201. if err != nil {
  202. xl.Warn("get natHoleRespMsg error: %v", err)
  203. return
  204. }
  205. err = msg.ReadMsgInto(bytes.NewReader(buf[:n]), &natHoleRespMsg)
  206. if err != nil {
  207. xl.Warn("get natHoleRespMsg error: %v", err)
  208. return
  209. }
  210. visitorConn.SetReadDeadline(time.Time{})
  211. pool.PutBuf(buf)
  212. if natHoleRespMsg.Error != "" {
  213. xl.Error("natHoleRespMsg get error info: %s", natHoleRespMsg.Error)
  214. return
  215. }
  216. xl.Trace("get natHoleRespMsg, sid [%s], client address [%s], visitor address [%s]", natHoleRespMsg.Sid, natHoleRespMsg.ClientAddr, natHoleRespMsg.VisitorAddr)
  217. // Close visitorConn, so we can use it's local address.
  218. visitorConn.Close()
  219. // send sid message to client
  220. laddr, _ := net.ResolveUDPAddr("udp", visitorConn.LocalAddr().String())
  221. daddr, err := net.ResolveUDPAddr("udp", natHoleRespMsg.ClientAddr)
  222. if err != nil {
  223. xl.Error("resolve client udp address error: %v", err)
  224. return
  225. }
  226. lConn, err := net.DialUDP("udp", laddr, daddr)
  227. if err != nil {
  228. xl.Error("dial client udp address error: %v", err)
  229. return
  230. }
  231. defer lConn.Close()
  232. lConn.Write([]byte(natHoleRespMsg.Sid))
  233. // read ack sid from client
  234. sidBuf := pool.GetBuf(1024)
  235. lConn.SetReadDeadline(time.Now().Add(8 * time.Second))
  236. n, err = lConn.Read(sidBuf)
  237. if err != nil {
  238. xl.Warn("get sid from client error: %v", err)
  239. return
  240. }
  241. lConn.SetReadDeadline(time.Time{})
  242. if string(sidBuf[:n]) != natHoleRespMsg.Sid {
  243. xl.Warn("incorrect sid from client")
  244. return
  245. }
  246. pool.PutBuf(sidBuf)
  247. xl.Info("nat hole connection make success, sid [%s]", natHoleRespMsg.Sid)
  248. // wrap kcp connection
  249. var remote io.ReadWriteCloser
  250. remote, err = frpNet.NewKcpConnFromUdp(lConn, true, natHoleRespMsg.ClientAddr)
  251. if err != nil {
  252. xl.Error("create kcp connection from udp connection error: %v", err)
  253. return
  254. }
  255. fmuxCfg := fmux.DefaultConfig()
  256. fmuxCfg.KeepAliveInterval = 5 * time.Second
  257. fmuxCfg.LogOutput = ioutil.Discard
  258. sess, err := fmux.Client(remote, fmuxCfg)
  259. if err != nil {
  260. xl.Error("create yamux session error: %v", err)
  261. return
  262. }
  263. defer sess.Close()
  264. muxConn, err := sess.Open()
  265. if err != nil {
  266. xl.Error("open yamux stream error: %v", err)
  267. return
  268. }
  269. var muxConnRWCloser io.ReadWriteCloser = muxConn
  270. if sv.cfg.UseEncryption {
  271. muxConnRWCloser, err = frpIo.WithEncryption(muxConnRWCloser, []byte(sv.cfg.Sk))
  272. if err != nil {
  273. xl.Error("create encryption stream error: %v", err)
  274. return
  275. }
  276. }
  277. if sv.cfg.UseCompression {
  278. muxConnRWCloser = frpIo.WithCompression(muxConnRWCloser)
  279. }
  280. frpIo.Join(userConn, muxConnRWCloser)
  281. xl.Debug("join connections closed")
  282. }