control.go 8.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327
  1. // Copyright 2017 fatedier, fatedier@gmail.com
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package client
  15. import (
  16. "crypto/tls"
  17. "fmt"
  18. "io"
  19. "runtime/debug"
  20. "sync"
  21. "time"
  22. "github.com/fatedier/frp/client/proxy"
  23. "github.com/fatedier/frp/models/config"
  24. "github.com/fatedier/frp/models/msg"
  25. "github.com/fatedier/frp/utils/log"
  26. frpNet "github.com/fatedier/frp/utils/net"
  27. "github.com/fatedier/golib/control/shutdown"
  28. "github.com/fatedier/golib/crypto"
  29. fmux "github.com/hashicorp/yamux"
  30. )
  31. type Control struct {
  32. // uniq id got from frps, attach it in loginMsg
  33. runId string
  34. // manage all proxies
  35. pxyCfgs map[string]config.ProxyConf
  36. pm *proxy.ProxyManager
  37. // manage all visitors
  38. vm *VisitorManager
  39. // control connection
  40. conn frpNet.Conn
  41. // tcp stream multiplexing, if enabled
  42. session *fmux.Session
  43. // put a message in this channel to send it over control connection to server
  44. sendCh chan (msg.Message)
  45. // read from this channel to get the next message sent by server
  46. readCh chan (msg.Message)
  47. // goroutines can block by reading from this channel, it will be closed only in reader() when control connection is closed
  48. closedCh chan struct{}
  49. closedDoneCh chan struct{}
  50. // last time got the Pong message
  51. lastPong time.Time
  52. // The client configuration
  53. clientCfg config.ClientCommonConf
  54. readerShutdown *shutdown.Shutdown
  55. writerShutdown *shutdown.Shutdown
  56. msgHandlerShutdown *shutdown.Shutdown
  57. // The UDP port that the server is listening on
  58. serverUDPPort int
  59. mu sync.RWMutex
  60. log.Logger
  61. }
  62. func NewControl(runId string, conn frpNet.Conn, session *fmux.Session, clientCfg config.ClientCommonConf,
  63. pxyCfgs map[string]config.ProxyConf, visitorCfgs map[string]config.VisitorConf, serverUDPPort int) *Control {
  64. ctl := &Control{
  65. runId: runId,
  66. conn: conn,
  67. session: session,
  68. pxyCfgs: pxyCfgs,
  69. sendCh: make(chan msg.Message, 100),
  70. readCh: make(chan msg.Message, 100),
  71. closedCh: make(chan struct{}),
  72. closedDoneCh: make(chan struct{}),
  73. clientCfg: clientCfg,
  74. readerShutdown: shutdown.New(),
  75. writerShutdown: shutdown.New(),
  76. msgHandlerShutdown: shutdown.New(),
  77. serverUDPPort: serverUDPPort,
  78. Logger: log.NewPrefixLogger(""),
  79. }
  80. ctl.pm = proxy.NewProxyManager(ctl.sendCh, runId, clientCfg, serverUDPPort)
  81. ctl.vm = NewVisitorManager(ctl)
  82. ctl.vm.Reload(visitorCfgs)
  83. return ctl
  84. }
  85. func (ctl *Control) Run() {
  86. go ctl.worker()
  87. // start all proxies
  88. ctl.pm.Reload(ctl.pxyCfgs)
  89. // start all visitors
  90. go ctl.vm.Run()
  91. return
  92. }
  93. func (ctl *Control) HandleReqWorkConn(inMsg *msg.ReqWorkConn) {
  94. workConn, err := ctl.connectServer()
  95. if err != nil {
  96. return
  97. }
  98. m := &msg.NewWorkConn{
  99. RunId: ctl.runId,
  100. }
  101. if err = msg.WriteMsg(workConn, m); err != nil {
  102. ctl.Warn("work connection write to server error: %v", err)
  103. workConn.Close()
  104. return
  105. }
  106. var startMsg msg.StartWorkConn
  107. if err = msg.ReadMsgInto(workConn, &startMsg); err != nil {
  108. ctl.Error("work connection closed, %v", err)
  109. workConn.Close()
  110. return
  111. }
  112. workConn.AddLogPrefix(startMsg.ProxyName)
  113. // dispatch this work connection to related proxy
  114. ctl.pm.HandleWorkConn(startMsg.ProxyName, workConn, &startMsg)
  115. }
  116. func (ctl *Control) HandleNewProxyResp(inMsg *msg.NewProxyResp) {
  117. // Server will return NewProxyResp message to each NewProxy message.
  118. // Start a new proxy handler if no error got
  119. err := ctl.pm.StartProxy(inMsg.ProxyName, inMsg.RemoteAddr, inMsg.Error)
  120. if err != nil {
  121. ctl.Warn("[%s] start error: %v", inMsg.ProxyName, err)
  122. } else {
  123. ctl.Info("[%s] start proxy success", inMsg.ProxyName)
  124. }
  125. }
  126. func (ctl *Control) Close() error {
  127. ctl.pm.Close()
  128. ctl.conn.Close()
  129. if ctl.session != nil {
  130. ctl.session.Close()
  131. }
  132. return nil
  133. }
  134. // ClosedDoneCh returns a channel which will be closed after all resources are released
  135. func (ctl *Control) ClosedDoneCh() <-chan struct{} {
  136. return ctl.closedDoneCh
  137. }
  138. // connectServer return a new connection to frps
  139. func (ctl *Control) connectServer() (conn frpNet.Conn, err error) {
  140. if ctl.clientCfg.TcpMux {
  141. stream, errRet := ctl.session.OpenStream()
  142. if errRet != nil {
  143. err = errRet
  144. ctl.Warn("start new connection to server error: %v", err)
  145. return
  146. }
  147. conn = frpNet.WrapConn(stream)
  148. } else {
  149. var tlsConfig *tls.Config
  150. if ctl.clientCfg.TLSEnable {
  151. tlsConfig = &tls.Config{
  152. InsecureSkipVerify: true,
  153. }
  154. }
  155. conn, err = frpNet.ConnectServerByProxyWithTLS(ctl.clientCfg.HttpProxy, ctl.clientCfg.Protocol,
  156. fmt.Sprintf("%s:%d", ctl.clientCfg.ServerAddr, ctl.clientCfg.ServerPort), tlsConfig)
  157. if err != nil {
  158. ctl.Warn("start new connection to server error: %v", err)
  159. return
  160. }
  161. }
  162. return
  163. }
  164. // reader read all messages from frps and send to readCh
  165. func (ctl *Control) reader() {
  166. defer func() {
  167. if err := recover(); err != nil {
  168. ctl.Error("panic error: %v", err)
  169. ctl.Error(string(debug.Stack()))
  170. }
  171. }()
  172. defer ctl.readerShutdown.Done()
  173. defer close(ctl.closedCh)
  174. encReader := crypto.NewReader(ctl.conn, []byte(ctl.clientCfg.Token))
  175. for {
  176. if m, err := msg.ReadMsg(encReader); err != nil {
  177. if err == io.EOF {
  178. ctl.Debug("read from control connection EOF")
  179. return
  180. } else {
  181. ctl.Warn("read error: %v", err)
  182. ctl.conn.Close()
  183. return
  184. }
  185. } else {
  186. ctl.readCh <- m
  187. }
  188. }
  189. }
  190. // writer writes messages got from sendCh to frps
  191. func (ctl *Control) writer() {
  192. defer ctl.writerShutdown.Done()
  193. encWriter, err := crypto.NewWriter(ctl.conn, []byte(ctl.clientCfg.Token))
  194. if err != nil {
  195. ctl.conn.Error("crypto new writer error: %v", err)
  196. ctl.conn.Close()
  197. return
  198. }
  199. for {
  200. if m, ok := <-ctl.sendCh; !ok {
  201. ctl.Info("control writer is closing")
  202. return
  203. } else {
  204. if err := msg.WriteMsg(encWriter, m); err != nil {
  205. ctl.Warn("write message to control connection error: %v", err)
  206. return
  207. }
  208. }
  209. }
  210. }
  211. // msgHandler handles all channel events and do corresponding operations.
  212. func (ctl *Control) msgHandler() {
  213. defer func() {
  214. if err := recover(); err != nil {
  215. ctl.Error("panic error: %v", err)
  216. ctl.Error(string(debug.Stack()))
  217. }
  218. }()
  219. defer ctl.msgHandlerShutdown.Done()
  220. hbSend := time.NewTicker(time.Duration(ctl.clientCfg.HeartBeatInterval) * time.Second)
  221. defer hbSend.Stop()
  222. hbCheck := time.NewTicker(time.Second)
  223. defer hbCheck.Stop()
  224. ctl.lastPong = time.Now()
  225. for {
  226. select {
  227. case <-hbSend.C:
  228. // send heartbeat to server
  229. ctl.Debug("send heartbeat to server")
  230. ctl.sendCh <- &msg.Ping{}
  231. case <-hbCheck.C:
  232. if time.Since(ctl.lastPong) > time.Duration(ctl.clientCfg.HeartBeatTimeout)*time.Second {
  233. ctl.Warn("heartbeat timeout")
  234. // let reader() stop
  235. ctl.conn.Close()
  236. return
  237. }
  238. case rawMsg, ok := <-ctl.readCh:
  239. if !ok {
  240. return
  241. }
  242. switch m := rawMsg.(type) {
  243. case *msg.ReqWorkConn:
  244. go ctl.HandleReqWorkConn(m)
  245. case *msg.NewProxyResp:
  246. ctl.HandleNewProxyResp(m)
  247. case *msg.Pong:
  248. ctl.lastPong = time.Now()
  249. ctl.Debug("receive heartbeat from server")
  250. }
  251. }
  252. }
  253. }
  254. // If controler is notified by closedCh, reader and writer and handler will exit
  255. func (ctl *Control) worker() {
  256. go ctl.msgHandler()
  257. go ctl.reader()
  258. go ctl.writer()
  259. select {
  260. case <-ctl.closedCh:
  261. // close related channels and wait until other goroutines done
  262. close(ctl.readCh)
  263. ctl.readerShutdown.WaitDone()
  264. ctl.msgHandlerShutdown.WaitDone()
  265. close(ctl.sendCh)
  266. ctl.writerShutdown.WaitDone()
  267. ctl.pm.Close()
  268. ctl.vm.Close()
  269. close(ctl.closedDoneCh)
  270. if ctl.session != nil {
  271. ctl.session.Close()
  272. }
  273. return
  274. }
  275. }
  276. func (ctl *Control) ReloadConf(pxyCfgs map[string]config.ProxyConf, visitorCfgs map[string]config.VisitorConf) error {
  277. ctl.vm.Reload(visitorCfgs)
  278. ctl.pm.Reload(pxyCfgs)
  279. return nil
  280. }