1
0

control.go 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663
  1. // Copyright 2017 fatedier, fatedier@gmail.com
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package server
  15. import (
  16. "context"
  17. "fmt"
  18. "io"
  19. "net"
  20. "runtime/debug"
  21. "sync"
  22. "time"
  23. "github.com/fatedier/golib/control/shutdown"
  24. "github.com/fatedier/golib/crypto"
  25. "github.com/fatedier/golib/errors"
  26. "github.com/samber/lo"
  27. "github.com/fatedier/frp/pkg/auth"
  28. "github.com/fatedier/frp/pkg/config"
  29. v1 "github.com/fatedier/frp/pkg/config/v1"
  30. pkgerr "github.com/fatedier/frp/pkg/errors"
  31. "github.com/fatedier/frp/pkg/msg"
  32. plugin "github.com/fatedier/frp/pkg/plugin/server"
  33. "github.com/fatedier/frp/pkg/transport"
  34. "github.com/fatedier/frp/pkg/util/util"
  35. "github.com/fatedier/frp/pkg/util/version"
  36. "github.com/fatedier/frp/pkg/util/xlog"
  37. "github.com/fatedier/frp/server/controller"
  38. "github.com/fatedier/frp/server/metrics"
  39. "github.com/fatedier/frp/server/proxy"
  40. )
  41. type ControlManager struct {
  42. // controls indexed by run id
  43. ctlsByRunID map[string]*Control
  44. mu sync.RWMutex
  45. }
  46. func NewControlManager() *ControlManager {
  47. return &ControlManager{
  48. ctlsByRunID: make(map[string]*Control),
  49. }
  50. }
  51. func (cm *ControlManager) Add(runID string, ctl *Control) (old *Control) {
  52. cm.mu.Lock()
  53. defer cm.mu.Unlock()
  54. var ok bool
  55. old, ok = cm.ctlsByRunID[runID]
  56. if ok {
  57. old.Replaced(ctl)
  58. }
  59. cm.ctlsByRunID[runID] = ctl
  60. return
  61. }
  62. // we should make sure if it's the same control to prevent delete a new one
  63. func (cm *ControlManager) Del(runID string, ctl *Control) {
  64. cm.mu.Lock()
  65. defer cm.mu.Unlock()
  66. if c, ok := cm.ctlsByRunID[runID]; ok && c == ctl {
  67. delete(cm.ctlsByRunID, runID)
  68. }
  69. }
  70. func (cm *ControlManager) GetByID(runID string) (ctl *Control, ok bool) {
  71. cm.mu.RLock()
  72. defer cm.mu.RUnlock()
  73. ctl, ok = cm.ctlsByRunID[runID]
  74. return
  75. }
  76. func (cm *ControlManager) Close() error {
  77. cm.mu.Lock()
  78. defer cm.mu.Unlock()
  79. for _, ctl := range cm.ctlsByRunID {
  80. ctl.Close()
  81. }
  82. cm.ctlsByRunID = make(map[string]*Control)
  83. return nil
  84. }
  85. type Control struct {
  86. // all resource managers and controllers
  87. rc *controller.ResourceController
  88. // proxy manager
  89. pxyManager *proxy.Manager
  90. // plugin manager
  91. pluginManager *plugin.Manager
  92. // verifies authentication based on selected method
  93. authVerifier auth.Verifier
  94. // other components can use this to communicate with client
  95. msgTransporter transport.MessageTransporter
  96. // login message
  97. loginMsg *msg.Login
  98. // control connection
  99. conn net.Conn
  100. // put a message in this channel to send it over control connection to client
  101. sendCh chan (msg.Message)
  102. // read from this channel to get the next message sent by client
  103. readCh chan (msg.Message)
  104. // work connections
  105. workConnCh chan net.Conn
  106. // proxies in one client
  107. proxies map[string]proxy.Proxy
  108. // pool count
  109. poolCount int
  110. // ports used, for limitations
  111. portsUsedNum int
  112. // last time got the Ping message
  113. lastPing time.Time
  114. // A new run id will be generated when a new client login.
  115. // If run id got from login message has same run id, it means it's the same client, so we can
  116. // replace old controller instantly.
  117. runID string
  118. readerShutdown *shutdown.Shutdown
  119. writerShutdown *shutdown.Shutdown
  120. managerShutdown *shutdown.Shutdown
  121. allShutdown *shutdown.Shutdown
  122. started bool
  123. mu sync.RWMutex
  124. // Server configuration information
  125. serverCfg *v1.ServerConfig
  126. xl *xlog.Logger
  127. ctx context.Context
  128. }
  129. func NewControl(
  130. ctx context.Context,
  131. rc *controller.ResourceController,
  132. pxyManager *proxy.Manager,
  133. pluginManager *plugin.Manager,
  134. authVerifier auth.Verifier,
  135. ctlConn net.Conn,
  136. loginMsg *msg.Login,
  137. serverCfg *v1.ServerConfig,
  138. ) *Control {
  139. poolCount := loginMsg.PoolCount
  140. if poolCount > int(serverCfg.Transport.MaxPoolCount) {
  141. poolCount = int(serverCfg.Transport.MaxPoolCount)
  142. }
  143. ctl := &Control{
  144. rc: rc,
  145. pxyManager: pxyManager,
  146. pluginManager: pluginManager,
  147. authVerifier: authVerifier,
  148. conn: ctlConn,
  149. loginMsg: loginMsg,
  150. sendCh: make(chan msg.Message, 10),
  151. readCh: make(chan msg.Message, 10),
  152. workConnCh: make(chan net.Conn, poolCount+10),
  153. proxies: make(map[string]proxy.Proxy),
  154. poolCount: poolCount,
  155. portsUsedNum: 0,
  156. lastPing: time.Now(),
  157. runID: loginMsg.RunID,
  158. readerShutdown: shutdown.New(),
  159. writerShutdown: shutdown.New(),
  160. managerShutdown: shutdown.New(),
  161. allShutdown: shutdown.New(),
  162. serverCfg: serverCfg,
  163. xl: xlog.FromContextSafe(ctx),
  164. ctx: ctx,
  165. }
  166. ctl.msgTransporter = transport.NewMessageTransporter(ctl.sendCh)
  167. return ctl
  168. }
  169. // Start send a login success message to client and start working.
  170. func (ctl *Control) Start() {
  171. loginRespMsg := &msg.LoginResp{
  172. Version: version.Full(),
  173. RunID: ctl.runID,
  174. Error: "",
  175. }
  176. _ = msg.WriteMsg(ctl.conn, loginRespMsg)
  177. ctl.mu.Lock()
  178. ctl.started = true
  179. ctl.mu.Unlock()
  180. go ctl.writer()
  181. go func() {
  182. for i := 0; i < ctl.poolCount; i++ {
  183. // ignore error here, that means that this control is closed
  184. _ = errors.PanicToError(func() {
  185. ctl.sendCh <- &msg.ReqWorkConn{}
  186. })
  187. }
  188. }()
  189. go ctl.manager()
  190. go ctl.reader()
  191. go ctl.stoper()
  192. }
  193. func (ctl *Control) Close() error {
  194. ctl.allShutdown.Start()
  195. return nil
  196. }
  197. func (ctl *Control) Replaced(newCtl *Control) {
  198. xl := ctl.xl
  199. xl.Info("Replaced by client [%s]", newCtl.runID)
  200. ctl.runID = ""
  201. ctl.allShutdown.Start()
  202. }
  203. func (ctl *Control) RegisterWorkConn(conn net.Conn) error {
  204. xl := ctl.xl
  205. defer func() {
  206. if err := recover(); err != nil {
  207. xl.Error("panic error: %v", err)
  208. xl.Error(string(debug.Stack()))
  209. }
  210. }()
  211. select {
  212. case ctl.workConnCh <- conn:
  213. xl.Debug("new work connection registered")
  214. return nil
  215. default:
  216. xl.Debug("work connection pool is full, discarding")
  217. return fmt.Errorf("work connection pool is full, discarding")
  218. }
  219. }
  220. // When frps get one user connection, we get one work connection from the pool and return it.
  221. // If no workConn available in the pool, send message to frpc to get one or more
  222. // and wait until it is available.
  223. // return an error if wait timeout
  224. func (ctl *Control) GetWorkConn() (workConn net.Conn, err error) {
  225. xl := ctl.xl
  226. defer func() {
  227. if err := recover(); err != nil {
  228. xl.Error("panic error: %v", err)
  229. xl.Error(string(debug.Stack()))
  230. }
  231. }()
  232. var ok bool
  233. // get a work connection from the pool
  234. select {
  235. case workConn, ok = <-ctl.workConnCh:
  236. if !ok {
  237. err = pkgerr.ErrCtlClosed
  238. return
  239. }
  240. xl.Debug("get work connection from pool")
  241. default:
  242. // no work connections available in the poll, send message to frpc to get more
  243. if err = errors.PanicToError(func() {
  244. ctl.sendCh <- &msg.ReqWorkConn{}
  245. }); err != nil {
  246. return nil, fmt.Errorf("control is already closed")
  247. }
  248. select {
  249. case workConn, ok = <-ctl.workConnCh:
  250. if !ok {
  251. err = pkgerr.ErrCtlClosed
  252. xl.Warn("no work connections available, %v", err)
  253. return
  254. }
  255. case <-time.After(time.Duration(ctl.serverCfg.UserConnTimeout) * time.Second):
  256. err = fmt.Errorf("timeout trying to get work connection")
  257. xl.Warn("%v", err)
  258. return
  259. }
  260. }
  261. // When we get a work connection from pool, replace it with a new one.
  262. _ = errors.PanicToError(func() {
  263. ctl.sendCh <- &msg.ReqWorkConn{}
  264. })
  265. return
  266. }
  267. func (ctl *Control) writer() {
  268. xl := ctl.xl
  269. defer func() {
  270. if err := recover(); err != nil {
  271. xl.Error("panic error: %v", err)
  272. xl.Error(string(debug.Stack()))
  273. }
  274. }()
  275. defer ctl.allShutdown.Start()
  276. defer ctl.writerShutdown.Done()
  277. encWriter, err := crypto.NewWriter(ctl.conn, []byte(ctl.serverCfg.Auth.Token))
  278. if err != nil {
  279. xl.Error("crypto new writer error: %v", err)
  280. ctl.allShutdown.Start()
  281. return
  282. }
  283. for {
  284. m, ok := <-ctl.sendCh
  285. if !ok {
  286. xl.Info("control writer is closing")
  287. return
  288. }
  289. if err := msg.WriteMsg(encWriter, m); err != nil {
  290. xl.Warn("write message to control connection error: %v", err)
  291. return
  292. }
  293. }
  294. }
  295. func (ctl *Control) reader() {
  296. xl := ctl.xl
  297. defer func() {
  298. if err := recover(); err != nil {
  299. xl.Error("panic error: %v", err)
  300. xl.Error(string(debug.Stack()))
  301. }
  302. }()
  303. defer ctl.allShutdown.Start()
  304. defer ctl.readerShutdown.Done()
  305. encReader := crypto.NewReader(ctl.conn, []byte(ctl.serverCfg.Auth.Token))
  306. for {
  307. m, err := msg.ReadMsg(encReader)
  308. if err != nil {
  309. if err == io.EOF {
  310. xl.Debug("control connection closed")
  311. return
  312. }
  313. xl.Warn("read error: %v", err)
  314. ctl.conn.Close()
  315. return
  316. }
  317. ctl.readCh <- m
  318. }
  319. }
  320. func (ctl *Control) stoper() {
  321. xl := ctl.xl
  322. defer func() {
  323. if err := recover(); err != nil {
  324. xl.Error("panic error: %v", err)
  325. xl.Error(string(debug.Stack()))
  326. }
  327. }()
  328. ctl.allShutdown.WaitStart()
  329. ctl.conn.Close()
  330. ctl.readerShutdown.WaitDone()
  331. close(ctl.readCh)
  332. ctl.managerShutdown.WaitDone()
  333. close(ctl.sendCh)
  334. ctl.writerShutdown.WaitDone()
  335. ctl.mu.Lock()
  336. defer ctl.mu.Unlock()
  337. close(ctl.workConnCh)
  338. for workConn := range ctl.workConnCh {
  339. workConn.Close()
  340. }
  341. for _, pxy := range ctl.proxies {
  342. pxy.Close()
  343. ctl.pxyManager.Del(pxy.GetName())
  344. metrics.Server.CloseProxy(pxy.GetName(), pxy.GetConfigurer().GetBaseConfig().Type)
  345. notifyContent := &plugin.CloseProxyContent{
  346. User: plugin.UserInfo{
  347. User: ctl.loginMsg.User,
  348. Metas: ctl.loginMsg.Metas,
  349. RunID: ctl.loginMsg.RunID,
  350. },
  351. CloseProxy: msg.CloseProxy{
  352. ProxyName: pxy.GetName(),
  353. },
  354. }
  355. go func() {
  356. _ = ctl.pluginManager.CloseProxy(notifyContent)
  357. }()
  358. }
  359. ctl.allShutdown.Done()
  360. xl.Info("client exit success")
  361. metrics.Server.CloseClient()
  362. }
  363. // block until Control closed
  364. func (ctl *Control) WaitClosed() {
  365. ctl.mu.RLock()
  366. started := ctl.started
  367. ctl.mu.RUnlock()
  368. if !started {
  369. ctl.allShutdown.Done()
  370. return
  371. }
  372. ctl.allShutdown.WaitDone()
  373. }
  374. func (ctl *Control) manager() {
  375. xl := ctl.xl
  376. defer func() {
  377. if err := recover(); err != nil {
  378. xl.Error("panic error: %v", err)
  379. xl.Error(string(debug.Stack()))
  380. }
  381. }()
  382. defer ctl.allShutdown.Start()
  383. defer ctl.managerShutdown.Done()
  384. var heartbeatCh <-chan time.Time
  385. // Don't need application heartbeat if TCPMux is enabled,
  386. // yamux will do same thing.
  387. if !lo.FromPtr(ctl.serverCfg.Transport.TCPMux) && ctl.serverCfg.Transport.HeartbeatTimeout > 0 {
  388. heartbeat := time.NewTicker(time.Second)
  389. defer heartbeat.Stop()
  390. heartbeatCh = heartbeat.C
  391. }
  392. for {
  393. select {
  394. case <-heartbeatCh:
  395. if time.Since(ctl.lastPing) > time.Duration(ctl.serverCfg.Transport.HeartbeatTimeout)*time.Second {
  396. xl.Warn("heartbeat timeout")
  397. return
  398. }
  399. case rawMsg, ok := <-ctl.readCh:
  400. if !ok {
  401. return
  402. }
  403. switch m := rawMsg.(type) {
  404. case *msg.NewProxy:
  405. content := &plugin.NewProxyContent{
  406. User: plugin.UserInfo{
  407. User: ctl.loginMsg.User,
  408. Metas: ctl.loginMsg.Metas,
  409. RunID: ctl.loginMsg.RunID,
  410. },
  411. NewProxy: *m,
  412. }
  413. var remoteAddr string
  414. retContent, err := ctl.pluginManager.NewProxy(content)
  415. if err == nil {
  416. m = &retContent.NewProxy
  417. remoteAddr, err = ctl.RegisterProxy(m)
  418. }
  419. // register proxy in this control
  420. resp := &msg.NewProxyResp{
  421. ProxyName: m.ProxyName,
  422. }
  423. if err != nil {
  424. xl.Warn("new proxy [%s] type [%s] error: %v", m.ProxyName, m.ProxyType, err)
  425. resp.Error = util.GenerateResponseErrorString(fmt.Sprintf("new proxy [%s] error", m.ProxyName),
  426. err, lo.FromPtr(ctl.serverCfg.DetailedErrorsToClient))
  427. } else {
  428. resp.RemoteAddr = remoteAddr
  429. xl.Info("new proxy [%s] type [%s] success", m.ProxyName, m.ProxyType)
  430. metrics.Server.NewProxy(m.ProxyName, m.ProxyType)
  431. }
  432. ctl.sendCh <- resp
  433. case *msg.NatHoleVisitor:
  434. go ctl.HandleNatHoleVisitor(m)
  435. case *msg.NatHoleClient:
  436. go ctl.HandleNatHoleClient(m)
  437. case *msg.NatHoleReport:
  438. go ctl.HandleNatHoleReport(m)
  439. case *msg.CloseProxy:
  440. _ = ctl.CloseProxy(m)
  441. xl.Info("close proxy [%s] success", m.ProxyName)
  442. case *msg.Ping:
  443. content := &plugin.PingContent{
  444. User: plugin.UserInfo{
  445. User: ctl.loginMsg.User,
  446. Metas: ctl.loginMsg.Metas,
  447. RunID: ctl.loginMsg.RunID,
  448. },
  449. Ping: *m,
  450. }
  451. retContent, err := ctl.pluginManager.Ping(content)
  452. if err == nil {
  453. m = &retContent.Ping
  454. err = ctl.authVerifier.VerifyPing(m)
  455. }
  456. if err != nil {
  457. xl.Warn("received invalid ping: %v", err)
  458. ctl.sendCh <- &msg.Pong{
  459. Error: util.GenerateResponseErrorString("invalid ping", err, lo.FromPtr(ctl.serverCfg.DetailedErrorsToClient)),
  460. }
  461. return
  462. }
  463. ctl.lastPing = time.Now()
  464. xl.Debug("receive heartbeat")
  465. ctl.sendCh <- &msg.Pong{}
  466. }
  467. }
  468. }
  469. }
  470. func (ctl *Control) HandleNatHoleVisitor(m *msg.NatHoleVisitor) {
  471. ctl.rc.NatHoleController.HandleVisitor(m, ctl.msgTransporter, ctl.loginMsg.User)
  472. }
  473. func (ctl *Control) HandleNatHoleClient(m *msg.NatHoleClient) {
  474. ctl.rc.NatHoleController.HandleClient(m, ctl.msgTransporter)
  475. }
  476. func (ctl *Control) HandleNatHoleReport(m *msg.NatHoleReport) {
  477. ctl.rc.NatHoleController.HandleReport(m)
  478. }
  479. func (ctl *Control) RegisterProxy(pxyMsg *msg.NewProxy) (remoteAddr string, err error) {
  480. var pxyConf v1.ProxyConfigurer
  481. // Load configures from NewProxy message and validate.
  482. pxyConf, err = config.NewProxyConfigurerFromMsg(pxyMsg, ctl.serverCfg)
  483. if err != nil {
  484. return
  485. }
  486. // User info
  487. userInfo := plugin.UserInfo{
  488. User: ctl.loginMsg.User,
  489. Metas: ctl.loginMsg.Metas,
  490. RunID: ctl.runID,
  491. }
  492. // NewProxy will return an interface Proxy.
  493. // In fact, it creates different proxies based on the proxy type. We just call run() here.
  494. pxy, err := proxy.NewProxy(ctl.ctx, &proxy.Options{
  495. UserInfo: userInfo,
  496. LoginMsg: ctl.loginMsg,
  497. PoolCount: ctl.poolCount,
  498. ResourceController: ctl.rc,
  499. GetWorkConnFn: ctl.GetWorkConn,
  500. Configurer: pxyConf,
  501. ServerCfg: ctl.serverCfg,
  502. })
  503. if err != nil {
  504. return remoteAddr, err
  505. }
  506. // Check ports used number in each client
  507. if ctl.serverCfg.MaxPortsPerClient > 0 {
  508. ctl.mu.Lock()
  509. if ctl.portsUsedNum+pxy.GetUsedPortsNum() > int(ctl.serverCfg.MaxPortsPerClient) {
  510. ctl.mu.Unlock()
  511. err = fmt.Errorf("exceed the max_ports_per_client")
  512. return
  513. }
  514. ctl.portsUsedNum += pxy.GetUsedPortsNum()
  515. ctl.mu.Unlock()
  516. defer func() {
  517. if err != nil {
  518. ctl.mu.Lock()
  519. ctl.portsUsedNum -= pxy.GetUsedPortsNum()
  520. ctl.mu.Unlock()
  521. }
  522. }()
  523. }
  524. if ctl.pxyManager.Exist(pxyMsg.ProxyName) {
  525. err = fmt.Errorf("proxy [%s] already exists", pxyMsg.ProxyName)
  526. return
  527. }
  528. remoteAddr, err = pxy.Run()
  529. if err != nil {
  530. return
  531. }
  532. defer func() {
  533. if err != nil {
  534. pxy.Close()
  535. }
  536. }()
  537. err = ctl.pxyManager.Add(pxyMsg.ProxyName, pxy)
  538. if err != nil {
  539. return
  540. }
  541. ctl.mu.Lock()
  542. ctl.proxies[pxy.GetName()] = pxy
  543. ctl.mu.Unlock()
  544. return
  545. }
  546. func (ctl *Control) CloseProxy(closeMsg *msg.CloseProxy) (err error) {
  547. ctl.mu.Lock()
  548. pxy, ok := ctl.proxies[closeMsg.ProxyName]
  549. if !ok {
  550. ctl.mu.Unlock()
  551. return
  552. }
  553. if ctl.serverCfg.MaxPortsPerClient > 0 {
  554. ctl.portsUsedNum -= pxy.GetUsedPortsNum()
  555. }
  556. pxy.Close()
  557. ctl.pxyManager.Del(pxy.GetName())
  558. delete(ctl.proxies, closeMsg.ProxyName)
  559. ctl.mu.Unlock()
  560. metrics.Server.CloseProxy(pxy.GetName(), pxy.GetConfigurer().GetBaseConfig().Type)
  561. notifyContent := &plugin.CloseProxyContent{
  562. User: plugin.UserInfo{
  563. User: ctl.loginMsg.User,
  564. Metas: ctl.loginMsg.Metas,
  565. RunID: ctl.loginMsg.RunID,
  566. },
  567. CloseProxy: msg.CloseProxy{
  568. ProxyName: pxy.GetName(),
  569. },
  570. }
  571. go func() {
  572. _ = ctl.pluginManager.CloseProxy(notifyContent)
  573. }()
  574. return
  575. }