123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257 |
- package msg
- import (
- "bytes"
- "encoding/binary"
- "fmt"
- "io"
- "sync"
- "github.com/fatedier/frp/src/models/config"
- "github.com/fatedier/frp/src/models/metric"
- "github.com/fatedier/frp/src/utils/conn"
- "github.com/fatedier/frp/src/utils/log"
- "github.com/fatedier/frp/src/utils/pcrypto"
- "github.com/fatedier/frp/src/utils/pool"
- )
- func Join(c1 *conn.Conn, c2 *conn.Conn) {
- var wait sync.WaitGroup
- pipe := func(to *conn.Conn, from *conn.Conn) {
- defer to.Close()
- defer from.Close()
- defer wait.Done()
- var err error
- _, err = io.Copy(to.TcpConn, from.TcpConn)
- if err != nil {
- log.Warn("join connections error, %v", err)
- }
- }
- wait.Add(2)
- go pipe(c1, c2)
- go pipe(c2, c1)
- wait.Wait()
- return
- }
- func JoinMore(c1 io.ReadWriteCloser, c2 io.ReadWriteCloser, conf config.BaseConf, needRecord bool) {
- var wait sync.WaitGroup
- encryptPipe := func(from io.ReadCloser, to io.WriteCloser) {
- defer from.Close()
- defer to.Close()
- defer wait.Done()
-
- pipeEncrypt(from, to, conf, needRecord)
- }
- decryptPipe := func(to io.ReadCloser, from io.WriteCloser) {
- defer from.Close()
- defer to.Close()
- defer wait.Done()
-
- pipeDecrypt(to, from, conf, needRecord)
- }
- if needRecord {
- metric.OpenConnection(conf.Name)
- }
- wait.Add(2)
- go encryptPipe(c1, c2)
- go decryptPipe(c2, c1)
- wait.Wait()
- if needRecord {
- metric.CloseConnection(conf.Name)
- }
- log.Debug("ProxyName [%s], One tunnel stopped", conf.Name)
- return
- }
- func pkgMsg(data []byte) []byte {
- llen := uint32(len(data))
- buf := new(bytes.Buffer)
- binary.Write(buf, binary.BigEndian, llen)
- buf.Write(data)
- return buf.Bytes()
- }
- func unpkgMsg(data []byte) (int, []byte, []byte) {
- if len(data) < 4 {
- return -1, nil, data
- }
- llen := int(binary.BigEndian.Uint32(data[0:4]))
-
- if len(data) < llen+4 {
- return -1, nil, data
- }
- return 0, data[4 : llen+4], data[llen+4:]
- }
- func pipeDecrypt(r io.Reader, w io.Writer, conf config.BaseConf, needRecord bool) (err error) {
- laes := new(pcrypto.Pcrypto)
- key := conf.AuthToken
- if conf.PrivilegeMode {
- key = conf.PrivilegeToken
- }
- if err := laes.Init([]byte(key)); err != nil {
- log.Warn("ProxyName [%s], Pcrypto Init error: %v", conf.Name, err)
- return fmt.Errorf("Pcrypto Init error: %v", err)
- }
-
- buf := pool.GetBuf(5*1024 + 4)
- defer pool.PutBuf(buf)
- var left, res []byte
- var cnt int = -1
-
- var flowBytes int64 = 0
- if needRecord {
- defer func() {
- metric.AddFlowOut(conf.Name, flowBytes)
- }()
- }
- for {
-
-
- var newBuf []byte
- if cnt < 0 {
- n, err := r.Read(buf)
- if err != nil {
- return err
- }
- newBuf = append(left, buf[0:n]...)
- } else {
- newBuf = left
- }
- cnt, res, left = unpkgMsg(newBuf)
- if cnt < 0 {
-
- if len(res) > 1024*1024 {
- log.Warn("ProxyName [%s], package length exceeds the limit")
- return fmt.Errorf("package length error")
- }
- continue
- }
-
- if conf.UseEncryption {
- res, err = laes.Decrypt(res)
- if err != nil {
- log.Warn("ProxyName [%s], decrypt error, %v", conf.Name, err)
- return fmt.Errorf("Decrypt error: %v", err)
- }
- }
-
- if conf.UseGzip {
- res, err = laes.Decompression(res)
- if err != nil {
- log.Warn("ProxyName [%s], decompression error, %v", conf.Name, err)
- return fmt.Errorf("Decompression error: %v", err)
- }
- }
- _, err = w.Write(res)
- if err != nil {
- return err
- }
- if needRecord {
- flowBytes += int64(len(res))
- if flowBytes >= 1024*1024 {
- metric.AddFlowOut(conf.Name, flowBytes)
- flowBytes = 0
- }
- }
- }
- return nil
- }
- func pipeEncrypt(r io.Reader, w io.Writer, conf config.BaseConf, needRecord bool) (err error) {
- laes := new(pcrypto.Pcrypto)
- key := conf.AuthToken
- if conf.PrivilegeMode {
- key = conf.PrivilegeToken
- }
- if err := laes.Init([]byte(key)); err != nil {
- log.Warn("ProxyName [%s], Pcrypto Init error: %v", conf.Name, err)
- return fmt.Errorf("Pcrypto Init error: %v", err)
- }
-
- var flowBytes int64 = 0
- if needRecord {
- defer func() {
- metric.AddFlowIn(conf.Name, flowBytes)
- }()
- }
-
- buf := pool.GetBuf(5*1024 + 4)
- defer pool.PutBuf(buf)
- for {
- n, err := r.Read(buf)
- if err != nil {
- return err
- }
- if needRecord {
- flowBytes += int64(n)
- if flowBytes >= 1024*1024 {
- metric.AddFlowIn(conf.Name, flowBytes)
- flowBytes = 0
- }
- }
- res := buf[0:n]
-
- if conf.UseGzip {
- res, err = laes.Compression(res)
- if err != nil {
- log.Warn("ProxyName [%s], compression error: %v", conf.Name, err)
- return fmt.Errorf("Compression error: %v", err)
- }
- }
-
- if conf.UseEncryption {
- res, err = laes.Encrypt(res)
- if err != nil {
- log.Warn("ProxyName [%s], encrypt error: %v", conf.Name, err)
- return fmt.Errorf("Encrypt error: %v", err)
- }
- }
- res = pkgMsg(res)
- _, err = w.Write(res)
- if err != nil {
- return err
- }
- }
- return nil
- }
|