process.go 5.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257
  1. // Copyright 2016 fatedier, fatedier@gmail.com
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package msg
  15. import (
  16. "bytes"
  17. "encoding/binary"
  18. "fmt"
  19. "io"
  20. "sync"
  21. "github.com/fatedier/frp/src/models/config"
  22. "github.com/fatedier/frp/src/models/metric"
  23. "github.com/fatedier/frp/src/utils/conn"
  24. "github.com/fatedier/frp/src/utils/log"
  25. "github.com/fatedier/frp/src/utils/pcrypto"
  26. "github.com/fatedier/frp/src/utils/pool"
  27. )
  28. // deprecated
  29. // will block until connection close
  30. func Join(c1 *conn.Conn, c2 *conn.Conn) {
  31. var wait sync.WaitGroup
  32. pipe := func(to *conn.Conn, from *conn.Conn) {
  33. defer to.Close()
  34. defer from.Close()
  35. defer wait.Done()
  36. var err error
  37. _, err = io.Copy(to.TcpConn, from.TcpConn)
  38. if err != nil {
  39. log.Warn("join connections error, %v", err)
  40. }
  41. }
  42. wait.Add(2)
  43. go pipe(c1, c2)
  44. go pipe(c2, c1)
  45. wait.Wait()
  46. return
  47. }
  48. // join two connections and do some operations
  49. func JoinMore(c1 io.ReadWriteCloser, c2 io.ReadWriteCloser, conf config.BaseConf, needRecord bool) {
  50. var wait sync.WaitGroup
  51. encryptPipe := func(from io.ReadCloser, to io.WriteCloser) {
  52. defer from.Close()
  53. defer to.Close()
  54. defer wait.Done()
  55. // we don't care about errors here
  56. pipeEncrypt(from, to, conf, needRecord)
  57. }
  58. decryptPipe := func(to io.ReadCloser, from io.WriteCloser) {
  59. defer from.Close()
  60. defer to.Close()
  61. defer wait.Done()
  62. // we don't care about errors here
  63. pipeDecrypt(to, from, conf, needRecord)
  64. }
  65. if needRecord {
  66. metric.OpenConnection(conf.Name)
  67. }
  68. wait.Add(2)
  69. go encryptPipe(c1, c2)
  70. go decryptPipe(c2, c1)
  71. wait.Wait()
  72. if needRecord {
  73. metric.CloseConnection(conf.Name)
  74. }
  75. log.Debug("ProxyName [%s], One tunnel stopped", conf.Name)
  76. return
  77. }
  78. func pkgMsg(data []byte) []byte {
  79. llen := uint32(len(data))
  80. buf := new(bytes.Buffer)
  81. binary.Write(buf, binary.BigEndian, llen)
  82. buf.Write(data)
  83. return buf.Bytes()
  84. }
  85. func unpkgMsg(data []byte) (int, []byte, []byte) {
  86. if len(data) < 4 {
  87. return -1, nil, data
  88. }
  89. llen := int(binary.BigEndian.Uint32(data[0:4]))
  90. // no complete
  91. if len(data) < llen+4 {
  92. return -1, nil, data
  93. }
  94. return 0, data[4 : llen+4], data[llen+4:]
  95. }
  96. // decrypt msg from reader, then write into writer
  97. func pipeDecrypt(r io.Reader, w io.Writer, conf config.BaseConf, needRecord bool) (err error) {
  98. laes := new(pcrypto.Pcrypto)
  99. key := conf.AuthToken
  100. if conf.PrivilegeMode {
  101. key = conf.PrivilegeToken
  102. }
  103. if err := laes.Init([]byte(key)); err != nil {
  104. log.Warn("ProxyName [%s], Pcrypto Init error: %v", conf.Name, err)
  105. return fmt.Errorf("Pcrypto Init error: %v", err)
  106. }
  107. // get []byte from buffer pool
  108. buf := pool.GetBuf(5*1024 + 4)
  109. defer pool.PutBuf(buf)
  110. var left, res []byte
  111. var cnt int = -1
  112. // record
  113. var flowBytes int64 = 0
  114. if needRecord {
  115. defer func() {
  116. metric.AddFlowOut(conf.Name, flowBytes)
  117. }()
  118. }
  119. for {
  120. // there may be more than 1 package in variable
  121. // and we read more bytes if unpkgMsg returns an error
  122. var newBuf []byte
  123. if cnt < 0 {
  124. n, err := r.Read(buf)
  125. if err != nil {
  126. return err
  127. }
  128. newBuf = append(left, buf[0:n]...)
  129. } else {
  130. newBuf = left
  131. }
  132. cnt, res, left = unpkgMsg(newBuf)
  133. if cnt < 0 {
  134. // limit one package length, maximum is 1MB
  135. if len(res) > 1024*1024 {
  136. log.Warn("ProxyName [%s], package length exceeds the limit")
  137. return fmt.Errorf("package length error")
  138. }
  139. continue
  140. }
  141. // aes
  142. if conf.UseEncryption {
  143. res, err = laes.Decrypt(res)
  144. if err != nil {
  145. log.Warn("ProxyName [%s], decrypt error, %v", conf.Name, err)
  146. return fmt.Errorf("Decrypt error: %v", err)
  147. }
  148. }
  149. // gzip
  150. if conf.UseGzip {
  151. res, err = laes.Decompression(res)
  152. if err != nil {
  153. log.Warn("ProxyName [%s], decompression error, %v", conf.Name, err)
  154. return fmt.Errorf("Decompression error: %v", err)
  155. }
  156. }
  157. _, err = w.Write(res)
  158. if err != nil {
  159. return err
  160. }
  161. if needRecord {
  162. flowBytes += int64(len(res))
  163. if flowBytes >= 1024*1024 {
  164. metric.AddFlowOut(conf.Name, flowBytes)
  165. flowBytes = 0
  166. }
  167. }
  168. }
  169. return nil
  170. }
  171. // recvive msg from reader, then encrypt msg into writer
  172. func pipeEncrypt(r io.Reader, w io.Writer, conf config.BaseConf, needRecord bool) (err error) {
  173. laes := new(pcrypto.Pcrypto)
  174. key := conf.AuthToken
  175. if conf.PrivilegeMode {
  176. key = conf.PrivilegeToken
  177. }
  178. if err := laes.Init([]byte(key)); err != nil {
  179. log.Warn("ProxyName [%s], Pcrypto Init error: %v", conf.Name, err)
  180. return fmt.Errorf("Pcrypto Init error: %v", err)
  181. }
  182. // record
  183. var flowBytes int64 = 0
  184. if needRecord {
  185. defer func() {
  186. metric.AddFlowIn(conf.Name, flowBytes)
  187. }()
  188. }
  189. // get []byte from buffer pool
  190. buf := pool.GetBuf(5*1024 + 4)
  191. defer pool.PutBuf(buf)
  192. for {
  193. n, err := r.Read(buf)
  194. if err != nil {
  195. return err
  196. }
  197. if needRecord {
  198. flowBytes += int64(n)
  199. if flowBytes >= 1024*1024 {
  200. metric.AddFlowIn(conf.Name, flowBytes)
  201. flowBytes = 0
  202. }
  203. }
  204. res := buf[0:n]
  205. // gzip
  206. if conf.UseGzip {
  207. res, err = laes.Compression(res)
  208. if err != nil {
  209. log.Warn("ProxyName [%s], compression error: %v", conf.Name, err)
  210. return fmt.Errorf("Compression error: %v", err)
  211. }
  212. }
  213. // aes
  214. if conf.UseEncryption {
  215. res, err = laes.Encrypt(res)
  216. if err != nil {
  217. log.Warn("ProxyName [%s], encrypt error: %v", conf.Name, err)
  218. return fmt.Errorf("Encrypt error: %v", err)
  219. }
  220. }
  221. res = pkgMsg(res)
  222. _, err = w.Write(res)
  223. if err != nil {
  224. return err
  225. }
  226. }
  227. return nil
  228. }