2017-03-22 19:01:25 +01:00
|
|
|
// Copyright 2017 fatedier, fatedier@gmail.com
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2017-03-08 19:03:47 +01:00
|
|
|
package server
|
|
|
|
|
|
|
|
import (
|
2019-10-12 14:13:12 +02:00
|
|
|
"context"
|
2017-03-08 19:03:47 +01:00
|
|
|
"fmt"
|
|
|
|
"io"
|
2019-10-12 14:13:12 +02:00
|
|
|
"net"
|
2018-05-11 04:42:57 +02:00
|
|
|
"runtime/debug"
|
2017-03-08 19:03:47 +01:00
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
2020-03-01 03:57:01 +01:00
|
|
|
"github.com/fatedier/frp/models/auth"
|
2017-03-08 19:03:47 +01:00
|
|
|
"github.com/fatedier/frp/models/config"
|
|
|
|
"github.com/fatedier/frp/models/consts"
|
2018-05-07 20:13:30 +02:00
|
|
|
frpErr "github.com/fatedier/frp/models/errors"
|
2017-03-08 19:03:47 +01:00
|
|
|
"github.com/fatedier/frp/models/msg"
|
2019-12-20 13:28:28 +01:00
|
|
|
plugin "github.com/fatedier/frp/models/plugin/server"
|
2019-01-14 17:11:08 +01:00
|
|
|
"github.com/fatedier/frp/server/controller"
|
2020-03-11 06:20:26 +01:00
|
|
|
"github.com/fatedier/frp/server/metrics"
|
2019-01-14 17:11:08 +01:00
|
|
|
"github.com/fatedier/frp/server/proxy"
|
2020-02-11 15:57:38 +01:00
|
|
|
"github.com/fatedier/frp/utils/util"
|
2017-03-08 19:03:47 +01:00
|
|
|
"github.com/fatedier/frp/utils/version"
|
2019-10-12 14:13:12 +02:00
|
|
|
"github.com/fatedier/frp/utils/xlog"
|
2018-05-07 20:13:30 +02:00
|
|
|
|
2018-05-08 17:51:13 +02:00
|
|
|
"github.com/fatedier/golib/control/shutdown"
|
2018-05-07 20:13:30 +02:00
|
|
|
"github.com/fatedier/golib/crypto"
|
|
|
|
"github.com/fatedier/golib/errors"
|
2017-03-08 19:03:47 +01:00
|
|
|
)
|
|
|
|
|
2019-01-14 17:11:08 +01:00
|
|
|
type ControlManager struct {
|
|
|
|
// controls indexed by run id
|
|
|
|
ctlsByRunId map[string]*Control
|
|
|
|
|
|
|
|
mu sync.RWMutex
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewControlManager() *ControlManager {
|
|
|
|
return &ControlManager{
|
|
|
|
ctlsByRunId: make(map[string]*Control),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cm *ControlManager) Add(runId string, ctl *Control) (oldCtl *Control) {
|
|
|
|
cm.mu.Lock()
|
|
|
|
defer cm.mu.Unlock()
|
|
|
|
|
|
|
|
oldCtl, ok := cm.ctlsByRunId[runId]
|
|
|
|
if ok {
|
|
|
|
oldCtl.Replaced(ctl)
|
|
|
|
}
|
|
|
|
cm.ctlsByRunId[runId] = ctl
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-01-26 14:36:24 +01:00
|
|
|
// we should make sure if it's the same control to prevent delete a new one
|
|
|
|
func (cm *ControlManager) Del(runId string, ctl *Control) {
|
2019-01-14 17:11:08 +01:00
|
|
|
cm.mu.Lock()
|
|
|
|
defer cm.mu.Unlock()
|
2019-01-26 14:36:24 +01:00
|
|
|
if c, ok := cm.ctlsByRunId[runId]; ok && c == ctl {
|
|
|
|
delete(cm.ctlsByRunId, runId)
|
|
|
|
}
|
2019-01-14 17:11:08 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func (cm *ControlManager) GetById(runId string) (ctl *Control, ok bool) {
|
|
|
|
cm.mu.RLock()
|
|
|
|
defer cm.mu.RUnlock()
|
|
|
|
ctl, ok = cm.ctlsByRunId[runId]
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-03-08 19:03:47 +01:00
|
|
|
type Control struct {
|
2019-01-10 13:53:06 +01:00
|
|
|
// all resource managers and controllers
|
2019-01-14 17:11:08 +01:00
|
|
|
rc *controller.ResourceController
|
|
|
|
|
|
|
|
// proxy manager
|
|
|
|
pxyManager *proxy.ProxyManager
|
|
|
|
|
2019-12-20 13:28:28 +01:00
|
|
|
// plugin manager
|
|
|
|
pluginManager *plugin.Manager
|
|
|
|
|
2020-03-01 03:57:01 +01:00
|
|
|
// verifies authentication based on selected method
|
|
|
|
authVerifier auth.Verifier
|
|
|
|
|
2017-03-08 19:03:47 +01:00
|
|
|
// login message
|
|
|
|
loginMsg *msg.Login
|
|
|
|
|
|
|
|
// control connection
|
|
|
|
conn net.Conn
|
|
|
|
|
|
|
|
// put a message in this channel to send it over control connection to client
|
|
|
|
sendCh chan (msg.Message)
|
|
|
|
|
|
|
|
// read from this channel to get the next message sent by client
|
|
|
|
readCh chan (msg.Message)
|
|
|
|
|
|
|
|
// work connections
|
|
|
|
workConnCh chan net.Conn
|
|
|
|
|
|
|
|
// proxies in one client
|
2019-01-14 17:11:08 +01:00
|
|
|
proxies map[string]proxy.Proxy
|
2017-03-08 19:03:47 +01:00
|
|
|
|
|
|
|
// pool count
|
|
|
|
poolCount int
|
|
|
|
|
2018-01-26 07:56:55 +01:00
|
|
|
// ports used, for limitations
|
|
|
|
portsUsedNum int
|
|
|
|
|
2017-03-08 19:03:47 +01:00
|
|
|
// last time got the Ping message
|
|
|
|
lastPing time.Time
|
|
|
|
|
|
|
|
// A new run id will be generated when a new client login.
|
|
|
|
// If run id got from login message has same run id, it means it's the same client, so we can
|
|
|
|
// replace old controller instantly.
|
|
|
|
runId string
|
|
|
|
|
|
|
|
// control status
|
|
|
|
status string
|
|
|
|
|
|
|
|
readerShutdown *shutdown.Shutdown
|
|
|
|
writerShutdown *shutdown.Shutdown
|
|
|
|
managerShutdown *shutdown.Shutdown
|
|
|
|
allShutdown *shutdown.Shutdown
|
|
|
|
|
|
|
|
mu sync.RWMutex
|
2019-08-19 20:07:37 +02:00
|
|
|
|
|
|
|
// Server configuration information
|
|
|
|
serverCfg config.ServerCommonConf
|
2019-10-12 14:13:12 +02:00
|
|
|
|
|
|
|
xl *xlog.Logger
|
|
|
|
ctx context.Context
|
2017-03-08 19:03:47 +01:00
|
|
|
}
|
|
|
|
|
2019-12-20 13:28:28 +01:00
|
|
|
func NewControl(
|
|
|
|
ctx context.Context,
|
|
|
|
rc *controller.ResourceController,
|
|
|
|
pxyManager *proxy.ProxyManager,
|
|
|
|
pluginManager *plugin.Manager,
|
2020-03-01 03:57:01 +01:00
|
|
|
authVerifier auth.Verifier,
|
2019-12-20 13:28:28 +01:00
|
|
|
ctlConn net.Conn,
|
|
|
|
loginMsg *msg.Login,
|
|
|
|
serverCfg config.ServerCommonConf,
|
|
|
|
) *Control {
|
2019-01-14 17:11:08 +01:00
|
|
|
|
2019-08-29 15:13:21 +02:00
|
|
|
poolCount := loginMsg.PoolCount
|
|
|
|
if poolCount > int(serverCfg.MaxPoolCount) {
|
|
|
|
poolCount = int(serverCfg.MaxPoolCount)
|
|
|
|
}
|
2017-03-08 19:03:47 +01:00
|
|
|
return &Control{
|
2019-01-10 13:53:06 +01:00
|
|
|
rc: rc,
|
2019-01-14 17:11:08 +01:00
|
|
|
pxyManager: pxyManager,
|
2019-12-20 13:28:28 +01:00
|
|
|
pluginManager: pluginManager,
|
2020-03-01 03:57:01 +01:00
|
|
|
authVerifier: authVerifier,
|
2017-03-08 19:03:47 +01:00
|
|
|
conn: ctlConn,
|
|
|
|
loginMsg: loginMsg,
|
|
|
|
sendCh: make(chan msg.Message, 10),
|
|
|
|
readCh: make(chan msg.Message, 10),
|
2019-08-29 15:13:21 +02:00
|
|
|
workConnCh: make(chan net.Conn, poolCount+10),
|
2019-01-14 17:11:08 +01:00
|
|
|
proxies: make(map[string]proxy.Proxy),
|
2019-08-29 15:13:21 +02:00
|
|
|
poolCount: poolCount,
|
2018-01-26 07:56:55 +01:00
|
|
|
portsUsedNum: 0,
|
2017-03-08 19:03:47 +01:00
|
|
|
lastPing: time.Now(),
|
|
|
|
runId: loginMsg.RunId,
|
|
|
|
status: consts.Working,
|
|
|
|
readerShutdown: shutdown.New(),
|
|
|
|
writerShutdown: shutdown.New(),
|
|
|
|
managerShutdown: shutdown.New(),
|
|
|
|
allShutdown: shutdown.New(),
|
2019-08-19 20:07:37 +02:00
|
|
|
serverCfg: serverCfg,
|
2019-10-12 14:13:12 +02:00
|
|
|
xl: xlog.FromContextSafe(ctx),
|
|
|
|
ctx: ctx,
|
2017-03-08 19:03:47 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start send a login success message to client and start working.
|
|
|
|
func (ctl *Control) Start() {
|
2017-03-09 18:42:06 +01:00
|
|
|
loginRespMsg := &msg.LoginResp{
|
2017-10-24 12:20:07 +02:00
|
|
|
Version: version.Full(),
|
|
|
|
RunId: ctl.runId,
|
2019-08-19 20:07:37 +02:00
|
|
|
ServerUdpPort: ctl.serverCfg.BindUdpPort,
|
2017-10-24 12:20:07 +02:00
|
|
|
Error: "",
|
2017-03-08 19:03:47 +01:00
|
|
|
}
|
2017-03-09 18:42:06 +01:00
|
|
|
msg.WriteMsg(ctl.conn, loginRespMsg)
|
2017-03-08 19:03:47 +01:00
|
|
|
|
2017-03-09 18:42:06 +01:00
|
|
|
go ctl.writer()
|
2017-03-08 19:03:47 +01:00
|
|
|
for i := 0; i < ctl.poolCount; i++ {
|
|
|
|
ctl.sendCh <- &msg.ReqWorkConn{}
|
|
|
|
}
|
|
|
|
|
|
|
|
go ctl.manager()
|
|
|
|
go ctl.reader()
|
|
|
|
go ctl.stoper()
|
|
|
|
}
|
|
|
|
|
2020-03-01 03:57:01 +01:00
|
|
|
func (ctl *Control) RegisterWorkConn(conn net.Conn) error {
|
2019-10-12 14:13:12 +02:00
|
|
|
xl := ctl.xl
|
2017-03-08 19:03:47 +01:00
|
|
|
defer func() {
|
|
|
|
if err := recover(); err != nil {
|
2019-10-12 14:13:12 +02:00
|
|
|
xl.Error("panic error: %v", err)
|
|
|
|
xl.Error(string(debug.Stack()))
|
2017-03-08 19:03:47 +01:00
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
select {
|
|
|
|
case ctl.workConnCh <- conn:
|
2019-10-12 14:13:12 +02:00
|
|
|
xl.Debug("new work connection registered")
|
2020-03-01 03:57:01 +01:00
|
|
|
return nil
|
2017-03-08 19:03:47 +01:00
|
|
|
default:
|
2019-10-12 14:13:12 +02:00
|
|
|
xl.Debug("work connection pool is full, discarding")
|
2020-03-01 03:57:01 +01:00
|
|
|
return fmt.Errorf("work connection pool is full, discarding")
|
2017-03-08 19:03:47 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// When frps get one user connection, we get one work connection from the pool and return it.
|
|
|
|
// If no workConn available in the pool, send message to frpc to get one or more
|
|
|
|
// and wait until it is available.
|
|
|
|
// return an error if wait timeout
|
|
|
|
func (ctl *Control) GetWorkConn() (workConn net.Conn, err error) {
|
2019-10-12 14:13:12 +02:00
|
|
|
xl := ctl.xl
|
2017-03-08 19:03:47 +01:00
|
|
|
defer func() {
|
|
|
|
if err := recover(); err != nil {
|
2019-10-12 14:13:12 +02:00
|
|
|
xl.Error("panic error: %v", err)
|
|
|
|
xl.Error(string(debug.Stack()))
|
2017-03-08 19:03:47 +01:00
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
var ok bool
|
|
|
|
// get a work connection from the pool
|
|
|
|
select {
|
|
|
|
case workConn, ok = <-ctl.workConnCh:
|
|
|
|
if !ok {
|
2018-05-07 20:13:30 +02:00
|
|
|
err = frpErr.ErrCtlClosed
|
2017-03-08 19:03:47 +01:00
|
|
|
return
|
|
|
|
}
|
2019-10-12 14:13:12 +02:00
|
|
|
xl.Debug("get work connection from pool")
|
2017-03-08 19:03:47 +01:00
|
|
|
default:
|
|
|
|
// no work connections available in the poll, send message to frpc to get more
|
|
|
|
err = errors.PanicToError(func() {
|
|
|
|
ctl.sendCh <- &msg.ReqWorkConn{}
|
|
|
|
})
|
|
|
|
if err != nil {
|
2019-10-12 14:13:12 +02:00
|
|
|
xl.Error("%v", err)
|
2017-03-08 19:03:47 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
select {
|
|
|
|
case workConn, ok = <-ctl.workConnCh:
|
|
|
|
if !ok {
|
2018-05-07 20:13:30 +02:00
|
|
|
err = frpErr.ErrCtlClosed
|
2019-10-12 14:13:12 +02:00
|
|
|
xl.Warn("no work connections avaiable, %v", err)
|
2017-03-08 19:03:47 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-08-19 20:07:37 +02:00
|
|
|
case <-time.After(time.Duration(ctl.serverCfg.UserConnTimeout) * time.Second):
|
2017-03-08 19:03:47 +01:00
|
|
|
err = fmt.Errorf("timeout trying to get work connection")
|
2019-10-12 14:13:12 +02:00
|
|
|
xl.Warn("%v", err)
|
2017-03-08 19:03:47 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// When we get a work connection from pool, replace it with a new one.
|
|
|
|
errors.PanicToError(func() {
|
|
|
|
ctl.sendCh <- &msg.ReqWorkConn{}
|
|
|
|
})
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ctl *Control) Replaced(newCtl *Control) {
|
2019-10-12 14:13:12 +02:00
|
|
|
xl := ctl.xl
|
|
|
|
xl.Info("Replaced by client [%s]", newCtl.runId)
|
2017-03-08 19:03:47 +01:00
|
|
|
ctl.runId = ""
|
|
|
|
ctl.allShutdown.Start()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ctl *Control) writer() {
|
2019-10-12 14:13:12 +02:00
|
|
|
xl := ctl.xl
|
2017-03-08 19:03:47 +01:00
|
|
|
defer func() {
|
|
|
|
if err := recover(); err != nil {
|
2019-10-12 14:13:12 +02:00
|
|
|
xl.Error("panic error: %v", err)
|
|
|
|
xl.Error(string(debug.Stack()))
|
2017-03-08 19:03:47 +01:00
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
defer ctl.allShutdown.Start()
|
|
|
|
defer ctl.writerShutdown.Done()
|
|
|
|
|
2019-08-19 20:07:37 +02:00
|
|
|
encWriter, err := crypto.NewWriter(ctl.conn, []byte(ctl.serverCfg.Token))
|
2017-03-09 18:42:06 +01:00
|
|
|
if err != nil {
|
2019-10-12 14:13:12 +02:00
|
|
|
xl.Error("crypto new writer error: %v", err)
|
2017-03-09 18:42:06 +01:00
|
|
|
ctl.allShutdown.Start()
|
|
|
|
return
|
|
|
|
}
|
2017-03-08 19:03:47 +01:00
|
|
|
for {
|
|
|
|
if m, ok := <-ctl.sendCh; !ok {
|
2019-10-12 14:13:12 +02:00
|
|
|
xl.Info("control writer is closing")
|
2017-03-08 19:03:47 +01:00
|
|
|
return
|
|
|
|
} else {
|
2017-03-09 18:42:06 +01:00
|
|
|
if err := msg.WriteMsg(encWriter, m); err != nil {
|
2019-10-12 14:13:12 +02:00
|
|
|
xl.Warn("write message to control connection error: %v", err)
|
2017-03-08 19:03:47 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ctl *Control) reader() {
|
2019-10-12 14:13:12 +02:00
|
|
|
xl := ctl.xl
|
2017-03-08 19:03:47 +01:00
|
|
|
defer func() {
|
|
|
|
if err := recover(); err != nil {
|
2019-10-12 14:13:12 +02:00
|
|
|
xl.Error("panic error: %v", err)
|
|
|
|
xl.Error(string(debug.Stack()))
|
2017-03-08 19:03:47 +01:00
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
defer ctl.allShutdown.Start()
|
|
|
|
defer ctl.readerShutdown.Done()
|
|
|
|
|
2019-08-19 20:07:37 +02:00
|
|
|
encReader := crypto.NewReader(ctl.conn, []byte(ctl.serverCfg.Token))
|
2017-03-08 19:03:47 +01:00
|
|
|
for {
|
2017-03-09 18:42:06 +01:00
|
|
|
if m, err := msg.ReadMsg(encReader); err != nil {
|
2017-03-08 19:03:47 +01:00
|
|
|
if err == io.EOF {
|
2019-10-12 14:13:12 +02:00
|
|
|
xl.Debug("control connection closed")
|
2017-03-08 19:03:47 +01:00
|
|
|
return
|
|
|
|
} else {
|
2019-10-12 14:13:12 +02:00
|
|
|
xl.Warn("read error: %v", err)
|
2019-04-08 09:39:14 +02:00
|
|
|
ctl.conn.Close()
|
2017-03-08 19:03:47 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
ctl.readCh <- m
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ctl *Control) stoper() {
|
2019-10-12 14:13:12 +02:00
|
|
|
xl := ctl.xl
|
2017-03-08 19:03:47 +01:00
|
|
|
defer func() {
|
|
|
|
if err := recover(); err != nil {
|
2019-10-12 14:13:12 +02:00
|
|
|
xl.Error("panic error: %v", err)
|
|
|
|
xl.Error(string(debug.Stack()))
|
2017-03-08 19:03:47 +01:00
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
ctl.allShutdown.WaitStart()
|
|
|
|
|
|
|
|
close(ctl.readCh)
|
2018-01-16 18:09:33 +01:00
|
|
|
ctl.managerShutdown.WaitDone()
|
2017-03-08 19:03:47 +01:00
|
|
|
|
|
|
|
close(ctl.sendCh)
|
2018-01-16 18:09:33 +01:00
|
|
|
ctl.writerShutdown.WaitDone()
|
2017-03-08 19:03:47 +01:00
|
|
|
|
|
|
|
ctl.conn.Close()
|
2018-01-16 18:09:33 +01:00
|
|
|
ctl.readerShutdown.WaitDone()
|
2017-03-08 19:03:47 +01:00
|
|
|
|
2018-03-19 13:22:15 +01:00
|
|
|
ctl.mu.Lock()
|
|
|
|
defer ctl.mu.Unlock()
|
|
|
|
|
2017-03-08 19:03:47 +01:00
|
|
|
close(ctl.workConnCh)
|
|
|
|
for workConn := range ctl.workConnCh {
|
|
|
|
workConn.Close()
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, pxy := range ctl.proxies {
|
|
|
|
pxy.Close()
|
2019-01-14 17:11:08 +01:00
|
|
|
ctl.pxyManager.Del(pxy.GetName())
|
2020-03-11 06:20:26 +01:00
|
|
|
metrics.Server.CloseProxy(pxy.GetName(), pxy.GetConf().GetBaseInfo().ProxyType)
|
2017-03-08 19:03:47 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
ctl.allShutdown.Done()
|
2019-10-12 14:13:12 +02:00
|
|
|
xl.Info("client exit success")
|
2020-03-11 06:20:26 +01:00
|
|
|
metrics.Server.CloseClient()
|
2019-01-14 17:11:08 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// block until Control closed
|
|
|
|
func (ctl *Control) WaitClosed() {
|
|
|
|
ctl.allShutdown.WaitDone()
|
2017-03-08 19:03:47 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func (ctl *Control) manager() {
|
2019-10-12 14:13:12 +02:00
|
|
|
xl := ctl.xl
|
2017-03-08 19:03:47 +01:00
|
|
|
defer func() {
|
|
|
|
if err := recover(); err != nil {
|
2019-10-12 14:13:12 +02:00
|
|
|
xl.Error("panic error: %v", err)
|
|
|
|
xl.Error(string(debug.Stack()))
|
2017-03-08 19:03:47 +01:00
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
defer ctl.allShutdown.Start()
|
|
|
|
defer ctl.managerShutdown.Done()
|
|
|
|
|
|
|
|
heartbeat := time.NewTicker(time.Second)
|
|
|
|
defer heartbeat.Stop()
|
|
|
|
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-heartbeat.C:
|
2019-08-19 20:07:37 +02:00
|
|
|
if time.Since(ctl.lastPing) > time.Duration(ctl.serverCfg.HeartBeatTimeout)*time.Second {
|
2019-10-12 14:13:12 +02:00
|
|
|
xl.Warn("heartbeat timeout")
|
2018-03-19 13:22:15 +01:00
|
|
|
return
|
2017-03-08 19:03:47 +01:00
|
|
|
}
|
|
|
|
case rawMsg, ok := <-ctl.readCh:
|
|
|
|
if !ok {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
switch m := rawMsg.(type) {
|
|
|
|
case *msg.NewProxy:
|
2019-12-20 13:28:28 +01:00
|
|
|
content := &plugin.NewProxyContent{
|
|
|
|
User: plugin.UserInfo{
|
|
|
|
User: ctl.loginMsg.User,
|
|
|
|
Metas: ctl.loginMsg.Metas,
|
2020-03-14 16:26:35 +01:00
|
|
|
RunId: ctl.loginMsg.RunId,
|
2019-12-20 13:28:28 +01:00
|
|
|
},
|
|
|
|
NewProxy: *m,
|
|
|
|
}
|
|
|
|
var remoteAddr string
|
|
|
|
retContent, err := ctl.pluginManager.NewProxy(content)
|
|
|
|
if err == nil {
|
|
|
|
m = &retContent.NewProxy
|
|
|
|
remoteAddr, err = ctl.RegisterProxy(m)
|
|
|
|
}
|
|
|
|
|
2017-03-08 19:03:47 +01:00
|
|
|
// register proxy in this control
|
|
|
|
resp := &msg.NewProxyResp{
|
|
|
|
ProxyName: m.ProxyName,
|
|
|
|
}
|
|
|
|
if err != nil {
|
2019-10-12 14:13:12 +02:00
|
|
|
xl.Warn("new proxy [%s] error: %v", m.ProxyName, err)
|
2020-02-11 15:57:38 +01:00
|
|
|
resp.Error = util.GenerateResponseErrorString(fmt.Sprintf("new proxy [%s] error", m.ProxyName), err, ctl.serverCfg.DetailedErrorsToClient)
|
2017-03-08 19:03:47 +01:00
|
|
|
} else {
|
2018-01-17 07:40:08 +01:00
|
|
|
resp.RemoteAddr = remoteAddr
|
2019-10-12 14:13:12 +02:00
|
|
|
xl.Info("new proxy [%s] success", m.ProxyName)
|
2020-03-11 06:20:26 +01:00
|
|
|
metrics.Server.NewProxy(m.ProxyName, m.ProxyType)
|
2017-03-08 19:03:47 +01:00
|
|
|
}
|
|
|
|
ctl.sendCh <- resp
|
2017-06-11 11:22:05 +02:00
|
|
|
case *msg.CloseProxy:
|
|
|
|
ctl.CloseProxy(m)
|
2019-10-12 14:13:12 +02:00
|
|
|
xl.Info("close proxy [%s] success", m.ProxyName)
|
2017-03-08 19:03:47 +01:00
|
|
|
case *msg.Ping:
|
2020-03-01 03:57:01 +01:00
|
|
|
if err := ctl.authVerifier.VerifyPing(m); err != nil {
|
|
|
|
xl.Warn("received invalid ping: %v", err)
|
|
|
|
ctl.sendCh <- &msg.Pong{
|
|
|
|
Error: "invalid authentication in ping",
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
2017-03-08 19:03:47 +01:00
|
|
|
ctl.lastPing = time.Now()
|
2019-10-12 14:13:12 +02:00
|
|
|
xl.Debug("receive heartbeat")
|
2017-03-08 19:03:47 +01:00
|
|
|
ctl.sendCh <- &msg.Pong{}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-17 07:40:08 +01:00
|
|
|
func (ctl *Control) RegisterProxy(pxyMsg *msg.NewProxy) (remoteAddr string, err error) {
|
2017-03-08 19:03:47 +01:00
|
|
|
var pxyConf config.ProxyConf
|
|
|
|
// Load configures from NewProxy message and check.
|
2019-08-19 20:07:37 +02:00
|
|
|
pxyConf, err = config.NewProxyConfFromMsg(pxyMsg, ctl.serverCfg)
|
2017-03-08 19:03:47 +01:00
|
|
|
if err != nil {
|
2018-01-17 07:40:08 +01:00
|
|
|
return
|
2017-03-08 19:03:47 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewProxy will return a interface Proxy.
|
|
|
|
// In fact it create different proxies by different proxy type, we just call run() here.
|
2020-03-11 06:20:26 +01:00
|
|
|
pxy, err := proxy.NewProxy(ctl.ctx, ctl.runId, ctl.rc, ctl.poolCount, ctl.GetWorkConn, pxyConf, ctl.serverCfg)
|
2017-03-08 19:03:47 +01:00
|
|
|
if err != nil {
|
2018-01-17 07:40:08 +01:00
|
|
|
return remoteAddr, err
|
2017-03-08 19:03:47 +01:00
|
|
|
}
|
|
|
|
|
2018-01-26 07:56:55 +01:00
|
|
|
// Check ports used number in each client
|
2019-08-19 20:07:37 +02:00
|
|
|
if ctl.serverCfg.MaxPortsPerClient > 0 {
|
2018-01-26 07:56:55 +01:00
|
|
|
ctl.mu.Lock()
|
2019-08-19 20:07:37 +02:00
|
|
|
if ctl.portsUsedNum+pxy.GetUsedPortsNum() > int(ctl.serverCfg.MaxPortsPerClient) {
|
2018-01-26 07:56:55 +01:00
|
|
|
ctl.mu.Unlock()
|
|
|
|
err = fmt.Errorf("exceed the max_ports_per_client")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
ctl.portsUsedNum = ctl.portsUsedNum + pxy.GetUsedPortsNum()
|
|
|
|
ctl.mu.Unlock()
|
|
|
|
|
|
|
|
defer func() {
|
|
|
|
if err != nil {
|
|
|
|
ctl.mu.Lock()
|
|
|
|
ctl.portsUsedNum = ctl.portsUsedNum - pxy.GetUsedPortsNum()
|
|
|
|
ctl.mu.Unlock()
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
2018-01-17 07:40:08 +01:00
|
|
|
remoteAddr, err = pxy.Run()
|
2017-03-08 19:03:47 +01:00
|
|
|
if err != nil {
|
2018-01-17 07:40:08 +01:00
|
|
|
return
|
2017-03-08 19:03:47 +01:00
|
|
|
}
|
|
|
|
defer func() {
|
|
|
|
if err != nil {
|
|
|
|
pxy.Close()
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
2019-01-14 17:11:08 +01:00
|
|
|
err = ctl.pxyManager.Add(pxyMsg.ProxyName, pxy)
|
2017-03-08 19:03:47 +01:00
|
|
|
if err != nil {
|
2018-01-17 07:40:08 +01:00
|
|
|
return
|
2017-03-08 19:03:47 +01:00
|
|
|
}
|
2017-06-11 11:22:05 +02:00
|
|
|
|
|
|
|
ctl.mu.Lock()
|
|
|
|
ctl.proxies[pxy.GetName()] = pxy
|
|
|
|
ctl.mu.Unlock()
|
2018-01-17 07:40:08 +01:00
|
|
|
return
|
2017-03-08 19:03:47 +01:00
|
|
|
}
|
2017-06-11 11:22:05 +02:00
|
|
|
|
|
|
|
func (ctl *Control) CloseProxy(closeMsg *msg.CloseProxy) (err error) {
|
|
|
|
ctl.mu.Lock()
|
|
|
|
pxy, ok := ctl.proxies[closeMsg.ProxyName]
|
|
|
|
if !ok {
|
2018-01-26 07:56:55 +01:00
|
|
|
ctl.mu.Unlock()
|
2017-06-11 11:22:05 +02:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-08-19 20:07:37 +02:00
|
|
|
if ctl.serverCfg.MaxPortsPerClient > 0 {
|
2018-01-26 07:56:55 +01:00
|
|
|
ctl.portsUsedNum = ctl.portsUsedNum - pxy.GetUsedPortsNum()
|
|
|
|
}
|
2017-06-11 11:22:05 +02:00
|
|
|
pxy.Close()
|
2019-01-14 17:11:08 +01:00
|
|
|
ctl.pxyManager.Del(pxy.GetName())
|
2017-06-26 19:59:30 +02:00
|
|
|
delete(ctl.proxies, closeMsg.ProxyName)
|
2018-01-26 07:56:55 +01:00
|
|
|
ctl.mu.Unlock()
|
|
|
|
|
2020-03-11 06:20:26 +01:00
|
|
|
metrics.Server.CloseProxy(pxy.GetName(), pxy.GetConf().GetBaseInfo().ProxyType)
|
2017-06-11 11:22:05 +02:00
|
|
|
return
|
|
|
|
}
|