service.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510
  1. // Copyright 2017 fatedier, fatedier@gmail.com
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package client
  15. import (
  16. "context"
  17. "crypto/tls"
  18. "fmt"
  19. "io"
  20. "math/rand"
  21. "net"
  22. "runtime"
  23. "strconv"
  24. "strings"
  25. "sync"
  26. "sync/atomic"
  27. "time"
  28. "github.com/fatedier/golib/crypto"
  29. libdial "github.com/fatedier/golib/net/dial"
  30. fmux "github.com/hashicorp/yamux"
  31. quic "github.com/quic-go/quic-go"
  32. "github.com/fatedier/frp/assets"
  33. "github.com/fatedier/frp/pkg/auth"
  34. "github.com/fatedier/frp/pkg/config"
  35. "github.com/fatedier/frp/pkg/msg"
  36. "github.com/fatedier/frp/pkg/transport"
  37. "github.com/fatedier/frp/pkg/util/log"
  38. utilnet "github.com/fatedier/frp/pkg/util/net"
  39. "github.com/fatedier/frp/pkg/util/util"
  40. "github.com/fatedier/frp/pkg/util/version"
  41. "github.com/fatedier/frp/pkg/util/xlog"
  42. )
  43. func init() {
  44. crypto.DefaultSalt = "frp"
  45. // TODO: remove this when we drop support for go1.19
  46. rand.Seed(time.Now().UnixNano())
  47. }
  48. // Service is a client service.
  49. type Service struct {
  50. // uniq id got from frps, attach it in loginMsg
  51. runID string
  52. // manager control connection with server
  53. ctl *Control
  54. ctlMu sync.RWMutex
  55. // Sets authentication based on selected method
  56. authSetter auth.Setter
  57. cfg config.ClientCommonConf
  58. pxyCfgs map[string]config.ProxyConf
  59. visitorCfgs map[string]config.VisitorConf
  60. cfgMu sync.RWMutex
  61. // The configuration file used to initialize this client, or an empty
  62. // string if no configuration file was used.
  63. cfgFile string
  64. exit uint32 // 0 means not exit
  65. // service context
  66. ctx context.Context
  67. // call cancel to stop service
  68. cancel context.CancelFunc
  69. }
  70. func NewService(
  71. cfg config.ClientCommonConf,
  72. pxyCfgs map[string]config.ProxyConf,
  73. visitorCfgs map[string]config.VisitorConf,
  74. cfgFile string,
  75. ) (svr *Service, err error) {
  76. svr = &Service{
  77. authSetter: auth.NewAuthSetter(cfg.ClientConfig),
  78. cfg: cfg,
  79. cfgFile: cfgFile,
  80. pxyCfgs: pxyCfgs,
  81. visitorCfgs: visitorCfgs,
  82. ctx: context.Background(),
  83. exit: 0,
  84. }
  85. return
  86. }
  87. func (svr *Service) GetController() *Control {
  88. svr.ctlMu.RLock()
  89. defer svr.ctlMu.RUnlock()
  90. return svr.ctl
  91. }
  92. func (svr *Service) Run(ctx context.Context) error {
  93. ctx, cancel := context.WithCancel(ctx)
  94. svr.ctx = xlog.NewContext(ctx, xlog.New())
  95. svr.cancel = cancel
  96. xl := xlog.FromContextSafe(svr.ctx)
  97. // set custom DNSServer
  98. if svr.cfg.DNSServer != "" {
  99. dnsAddr := svr.cfg.DNSServer
  100. if _, _, err := net.SplitHostPort(dnsAddr); err != nil {
  101. dnsAddr = net.JoinHostPort(dnsAddr, "53")
  102. }
  103. // Change default dns server for frpc
  104. net.DefaultResolver = &net.Resolver{
  105. PreferGo: true,
  106. Dial: func(ctx context.Context, network, address string) (net.Conn, error) {
  107. return net.Dial("udp", dnsAddr)
  108. },
  109. }
  110. }
  111. // login to frps
  112. for {
  113. conn, cm, err := svr.login()
  114. if err != nil {
  115. xl.Warn("login to server failed: %v", err)
  116. // if login_fail_exit is true, just exit this program
  117. // otherwise sleep a while and try again to connect to server
  118. if svr.cfg.LoginFailExit {
  119. return err
  120. }
  121. util.RandomSleep(5*time.Second, 0.9, 1.1)
  122. } else {
  123. // login success
  124. ctl := NewControl(svr.ctx, svr.runID, conn, cm, svr.cfg, svr.pxyCfgs, svr.visitorCfgs, svr.authSetter)
  125. ctl.Run()
  126. svr.ctlMu.Lock()
  127. svr.ctl = ctl
  128. svr.ctlMu.Unlock()
  129. break
  130. }
  131. }
  132. go svr.keepControllerWorking()
  133. if svr.cfg.AdminPort != 0 {
  134. // Init admin server assets
  135. assets.Load(svr.cfg.AssetsDir)
  136. address := net.JoinHostPort(svr.cfg.AdminAddr, strconv.Itoa(svr.cfg.AdminPort))
  137. err := svr.RunAdminServer(address)
  138. if err != nil {
  139. log.Warn("run admin server error: %v", err)
  140. }
  141. log.Info("admin server listen on %s:%d", svr.cfg.AdminAddr, svr.cfg.AdminPort)
  142. }
  143. <-svr.ctx.Done()
  144. // service context may not be canceled by svr.Close(), we should call it here to release resources
  145. if atomic.LoadUint32(&svr.exit) == 0 {
  146. svr.Close()
  147. }
  148. return nil
  149. }
  150. func (svr *Service) keepControllerWorking() {
  151. xl := xlog.FromContextSafe(svr.ctx)
  152. maxDelayTime := 20 * time.Second
  153. delayTime := time.Second
  154. // if frpc reconnect frps, we need to limit retry times in 1min
  155. // current retry logic is sleep 0s, 0s, 0s, 1s, 2s, 4s, 8s, ...
  156. // when exceed 1min, we will reset delay and counts
  157. cutoffTime := time.Now().Add(time.Minute)
  158. reconnectDelay := time.Second
  159. reconnectCounts := 1
  160. for {
  161. <-svr.ctl.ClosedDoneCh()
  162. if atomic.LoadUint32(&svr.exit) != 0 {
  163. return
  164. }
  165. // the first three attempts with a low delay
  166. if reconnectCounts > 3 {
  167. util.RandomSleep(reconnectDelay, 0.9, 1.1)
  168. xl.Info("wait %v to reconnect", reconnectDelay)
  169. reconnectDelay *= 2
  170. } else {
  171. util.RandomSleep(time.Second, 0, 0.5)
  172. }
  173. reconnectCounts++
  174. now := time.Now()
  175. if now.After(cutoffTime) {
  176. // reset
  177. cutoffTime = now.Add(time.Minute)
  178. reconnectDelay = time.Second
  179. reconnectCounts = 1
  180. }
  181. for {
  182. if atomic.LoadUint32(&svr.exit) != 0 {
  183. return
  184. }
  185. xl.Info("try to reconnect to server...")
  186. conn, cm, err := svr.login()
  187. if err != nil {
  188. xl.Warn("reconnect to server error: %v, wait %v for another retry", err, delayTime)
  189. util.RandomSleep(delayTime, 0.9, 1.1)
  190. delayTime *= 2
  191. if delayTime > maxDelayTime {
  192. delayTime = maxDelayTime
  193. }
  194. continue
  195. }
  196. // reconnect success, init delayTime
  197. delayTime = time.Second
  198. ctl := NewControl(svr.ctx, svr.runID, conn, cm, svr.cfg, svr.pxyCfgs, svr.visitorCfgs, svr.authSetter)
  199. ctl.Run()
  200. svr.ctlMu.Lock()
  201. if svr.ctl != nil {
  202. svr.ctl.Close()
  203. }
  204. svr.ctl = ctl
  205. svr.ctlMu.Unlock()
  206. break
  207. }
  208. }
  209. }
  210. // login creates a connection to frps and registers it self as a client
  211. // conn: control connection
  212. // session: if it's not nil, using tcp mux
  213. func (svr *Service) login() (conn net.Conn, cm *ConnectionManager, err error) {
  214. xl := xlog.FromContextSafe(svr.ctx)
  215. cm = NewConnectionManager(svr.ctx, &svr.cfg)
  216. if err = cm.OpenConnection(); err != nil {
  217. return nil, nil, err
  218. }
  219. defer func() {
  220. if err != nil {
  221. cm.Close()
  222. }
  223. }()
  224. conn, err = cm.Connect()
  225. if err != nil {
  226. return
  227. }
  228. loginMsg := &msg.Login{
  229. Arch: runtime.GOARCH,
  230. Os: runtime.GOOS,
  231. PoolCount: svr.cfg.PoolCount,
  232. User: svr.cfg.User,
  233. Version: version.Full(),
  234. Timestamp: time.Now().Unix(),
  235. RunID: svr.runID,
  236. Metas: svr.cfg.Metas,
  237. }
  238. // Add auth
  239. if err = svr.authSetter.SetLogin(loginMsg); err != nil {
  240. return
  241. }
  242. if err = msg.WriteMsg(conn, loginMsg); err != nil {
  243. return
  244. }
  245. var loginRespMsg msg.LoginResp
  246. _ = conn.SetReadDeadline(time.Now().Add(10 * time.Second))
  247. if err = msg.ReadMsgInto(conn, &loginRespMsg); err != nil {
  248. return
  249. }
  250. _ = conn.SetReadDeadline(time.Time{})
  251. if loginRespMsg.Error != "" {
  252. err = fmt.Errorf("%s", loginRespMsg.Error)
  253. xl.Error("%s", loginRespMsg.Error)
  254. return
  255. }
  256. svr.runID = loginRespMsg.RunID
  257. xl.ResetPrefixes()
  258. xl.AppendPrefix(svr.runID)
  259. xl.Info("login to server success, get run id [%s]", loginRespMsg.RunID)
  260. return
  261. }
  262. func (svr *Service) ReloadConf(pxyCfgs map[string]config.ProxyConf, visitorCfgs map[string]config.VisitorConf) error {
  263. svr.cfgMu.Lock()
  264. svr.pxyCfgs = pxyCfgs
  265. svr.visitorCfgs = visitorCfgs
  266. svr.cfgMu.Unlock()
  267. svr.ctlMu.RLock()
  268. ctl := svr.ctl
  269. svr.ctlMu.RUnlock()
  270. if ctl != nil {
  271. return svr.ctl.ReloadConf(pxyCfgs, visitorCfgs)
  272. }
  273. return nil
  274. }
  275. func (svr *Service) Close() {
  276. svr.GracefulClose(time.Duration(0))
  277. }
  278. func (svr *Service) GracefulClose(d time.Duration) {
  279. atomic.StoreUint32(&svr.exit, 1)
  280. svr.ctlMu.RLock()
  281. if svr.ctl != nil {
  282. svr.ctl.GracefulClose(d)
  283. svr.ctl = nil
  284. }
  285. svr.ctlMu.RUnlock()
  286. if svr.cancel != nil {
  287. svr.cancel()
  288. }
  289. }
  290. type ConnectionManager struct {
  291. ctx context.Context
  292. cfg *config.ClientCommonConf
  293. muxSession *fmux.Session
  294. quicConn quic.Connection
  295. }
  296. func NewConnectionManager(ctx context.Context, cfg *config.ClientCommonConf) *ConnectionManager {
  297. return &ConnectionManager{
  298. ctx: ctx,
  299. cfg: cfg,
  300. }
  301. }
  302. func (cm *ConnectionManager) OpenConnection() error {
  303. xl := xlog.FromContextSafe(cm.ctx)
  304. // special for quic
  305. if strings.EqualFold(cm.cfg.Protocol, "quic") {
  306. var tlsConfig *tls.Config
  307. var err error
  308. sn := cm.cfg.TLSServerName
  309. if sn == "" {
  310. sn = cm.cfg.ServerAddr
  311. }
  312. if cm.cfg.TLSEnable {
  313. tlsConfig, err = transport.NewClientTLSConfig(
  314. cm.cfg.TLSCertFile,
  315. cm.cfg.TLSKeyFile,
  316. cm.cfg.TLSTrustedCaFile,
  317. sn)
  318. } else {
  319. tlsConfig, err = transport.NewClientTLSConfig("", "", "", sn)
  320. }
  321. if err != nil {
  322. xl.Warn("fail to build tls configuration, err: %v", err)
  323. return err
  324. }
  325. tlsConfig.NextProtos = []string{"frp"}
  326. conn, err := quic.DialAddrContext(
  327. cm.ctx,
  328. net.JoinHostPort(cm.cfg.ServerAddr, strconv.Itoa(cm.cfg.ServerPort)),
  329. tlsConfig, &quic.Config{
  330. MaxIdleTimeout: time.Duration(cm.cfg.QUICMaxIdleTimeout) * time.Second,
  331. MaxIncomingStreams: int64(cm.cfg.QUICMaxIncomingStreams),
  332. KeepAlivePeriod: time.Duration(cm.cfg.QUICKeepalivePeriod) * time.Second,
  333. })
  334. if err != nil {
  335. return err
  336. }
  337. cm.quicConn = conn
  338. return nil
  339. }
  340. if !cm.cfg.TCPMux {
  341. return nil
  342. }
  343. conn, err := cm.realConnect()
  344. if err != nil {
  345. return err
  346. }
  347. fmuxCfg := fmux.DefaultConfig()
  348. fmuxCfg.KeepAliveInterval = time.Duration(cm.cfg.TCPMuxKeepaliveInterval) * time.Second
  349. fmuxCfg.LogOutput = io.Discard
  350. fmuxCfg.MaxStreamWindowSize = 6 * 1024 * 1024
  351. session, err := fmux.Client(conn, fmuxCfg)
  352. if err != nil {
  353. return err
  354. }
  355. cm.muxSession = session
  356. return nil
  357. }
  358. func (cm *ConnectionManager) Connect() (net.Conn, error) {
  359. if cm.quicConn != nil {
  360. stream, err := cm.quicConn.OpenStreamSync(context.Background())
  361. if err != nil {
  362. return nil, err
  363. }
  364. return utilnet.QuicStreamToNetConn(stream, cm.quicConn), nil
  365. } else if cm.muxSession != nil {
  366. stream, err := cm.muxSession.OpenStream()
  367. if err != nil {
  368. return nil, err
  369. }
  370. return stream, nil
  371. }
  372. return cm.realConnect()
  373. }
  374. func (cm *ConnectionManager) realConnect() (net.Conn, error) {
  375. xl := xlog.FromContextSafe(cm.ctx)
  376. var tlsConfig *tls.Config
  377. var err error
  378. tlsEnable := cm.cfg.TLSEnable
  379. if cm.cfg.Protocol == "wss" {
  380. tlsEnable = true
  381. }
  382. if tlsEnable {
  383. sn := cm.cfg.TLSServerName
  384. if sn == "" {
  385. sn = cm.cfg.ServerAddr
  386. }
  387. tlsConfig, err = transport.NewClientTLSConfig(
  388. cm.cfg.TLSCertFile,
  389. cm.cfg.TLSKeyFile,
  390. cm.cfg.TLSTrustedCaFile,
  391. sn)
  392. if err != nil {
  393. xl.Warn("fail to build tls configuration, err: %v", err)
  394. return nil, err
  395. }
  396. }
  397. proxyType, addr, auth, err := libdial.ParseProxyURL(cm.cfg.HTTPProxy)
  398. if err != nil {
  399. xl.Error("fail to parse proxy url")
  400. return nil, err
  401. }
  402. dialOptions := []libdial.DialOption{}
  403. protocol := cm.cfg.Protocol
  404. switch protocol {
  405. case "websocket":
  406. protocol = "tcp"
  407. dialOptions = append(dialOptions, libdial.WithAfterHook(libdial.AfterHook{Hook: utilnet.DialHookWebsocket(protocol, "")}))
  408. dialOptions = append(dialOptions, libdial.WithAfterHook(libdial.AfterHook{
  409. Hook: utilnet.DialHookCustomTLSHeadByte(tlsConfig != nil, cm.cfg.DisableCustomTLSFirstByte),
  410. }))
  411. dialOptions = append(dialOptions, libdial.WithTLSConfig(tlsConfig))
  412. case "wss":
  413. protocol = "tcp"
  414. dialOptions = append(dialOptions, libdial.WithTLSConfigAndPriority(100, tlsConfig))
  415. // Make sure that if it is wss, the websocket hook is executed after the tls hook.
  416. dialOptions = append(dialOptions, libdial.WithAfterHook(libdial.AfterHook{Hook: utilnet.DialHookWebsocket(protocol, tlsConfig.ServerName), Priority: 110}))
  417. default:
  418. dialOptions = append(dialOptions, libdial.WithTLSConfig(tlsConfig))
  419. }
  420. if cm.cfg.ConnectServerLocalIP != "" {
  421. dialOptions = append(dialOptions, libdial.WithLocalAddr(cm.cfg.ConnectServerLocalIP))
  422. }
  423. dialOptions = append(dialOptions,
  424. libdial.WithProtocol(protocol),
  425. libdial.WithTimeout(time.Duration(cm.cfg.DialServerTimeout)*time.Second),
  426. libdial.WithKeepAlive(time.Duration(cm.cfg.DialServerKeepAlive)*time.Second),
  427. libdial.WithProxy(proxyType, addr),
  428. libdial.WithProxyAuth(auth),
  429. )
  430. conn, err := libdial.DialContext(
  431. cm.ctx,
  432. net.JoinHostPort(cm.cfg.ServerAddr, strconv.Itoa(cm.cfg.ServerPort)),
  433. dialOptions...,
  434. )
  435. return conn, err
  436. }
  437. func (cm *ConnectionManager) Close() error {
  438. if cm.quicConn != nil {
  439. _ = cm.quicConn.CloseWithError(0, "")
  440. }
  441. if cm.muxSession != nil {
  442. _ = cm.muxSession.Close()
  443. }
  444. return nil
  445. }