frp/models/msg/msg.go

195 lines
5.6 KiB
Go
Raw Normal View History

2017-03-08 19:03:47 +01:00
// Copyright 2016 fatedier, fatedier@gmail.com
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package msg
2018-05-11 10:37:44 +02:00
import "net"
2017-03-08 19:03:47 +01:00
const (
2019-03-11 08:53:58 +01:00
TypeLogin = 'o'
TypeLoginResp = '1'
TypeNewProxy = 'p'
TypeNewProxyResp = '2'
TypeCloseProxy = 'c'
TypeNewWorkConn = 'w'
TypeReqWorkConn = 'r'
TypeStartWorkConn = 's'
TypeNewVisitorConn = 'v'
TypeNewVisitorConnResp = '3'
TypePing = 'h'
TypePong = '4'
TypeUdpPacket = 'u'
TypeNatHoleVisitor = 'i'
TypeNatHoleClient = 'n'
TypeNatHoleResp = 'm'
TypeNatHoleClientDetectOK = 'd'
TypeNatHoleSid = '5'
2017-03-08 19:03:47 +01:00
)
var (
2018-05-11 10:37:44 +02:00
msgTypeMap = map[byte]interface{}{
2019-03-11 08:53:58 +01:00
TypeLogin: Login{},
TypeLoginResp: LoginResp{},
TypeNewProxy: NewProxy{},
TypeNewProxyResp: NewProxyResp{},
TypeCloseProxy: CloseProxy{},
TypeNewWorkConn: NewWorkConn{},
TypeReqWorkConn: ReqWorkConn{},
TypeStartWorkConn: StartWorkConn{},
TypeNewVisitorConn: NewVisitorConn{},
TypeNewVisitorConnResp: NewVisitorConnResp{},
TypePing: Ping{},
TypePong: Pong{},
TypeUdpPacket: UdpPacket{},
TypeNatHoleVisitor: NatHoleVisitor{},
TypeNatHoleClient: NatHoleClient{},
TypeNatHoleResp: NatHoleResp{},
TypeNatHoleClientDetectOK: NatHoleClientDetectOK{},
TypeNatHoleSid: NatHoleSid{},
2017-03-08 19:03:47 +01:00
}
2018-05-11 10:37:44 +02:00
)
2017-03-08 19:03:47 +01:00
// When frpc start, client send this message to login to server.
type Login struct {
2019-12-08 14:01:58 +01:00
Version string `json:"version"`
Hostname string `json:"hostname"`
Os string `json:"os"`
Arch string `json:"arch"`
User string `json:"user"`
PrivilegeKey string `json:"privilege_key"`
Timestamp int64 `json:"timestamp"`
RunId string `json:"run_id"`
Metas map[string]string `json:"metas"`
2017-03-08 19:03:47 +01:00
// Some global configures.
PoolCount int `json:"pool_count"`
}
type LoginResp struct {
2017-10-24 12:20:07 +02:00
Version string `json:"version"`
RunId string `json:"run_id"`
ServerUdpPort int `json:"server_udp_port"`
2017-10-24 12:20:07 +02:00
Error string `json:"error"`
2017-03-08 19:03:47 +01:00
}
// When frpc login success, send this message to frps for running a new proxy.
type NewProxy struct {
2019-12-08 14:01:58 +01:00
ProxyName string `json:"proxy_name"`
ProxyType string `json:"proxy_type"`
UseEncryption bool `json:"use_encryption"`
UseCompression bool `json:"use_compression"`
Group string `json:"group"`
GroupKey string `json:"group_key"`
Metas map[string]string `json:"metas"`
2017-03-08 19:03:47 +01:00
// tcp and udp only
RemotePort int `json:"remote_port"`
2017-03-08 19:03:47 +01:00
// http and https only
2018-05-20 17:22:07 +02:00
CustomDomains []string `json:"custom_domains"`
SubDomain string `json:"subdomain"`
Locations []string `json:"locations"`
HttpUser string `json:"http_user"`
HttpPwd string `json:"http_pwd"`
HostHeaderRewrite string `json:"host_header_rewrite"`
Headers map[string]string `json:"headers"`
2017-06-25 21:02:33 +02:00
// stcp
Sk string `json:"sk"`
// tcpmux
Multiplexer string `json:"multiplexer"`
2017-03-08 19:03:47 +01:00
}
type NewProxyResp struct {
2018-01-17 07:40:08 +01:00
ProxyName string `json:"proxy_name"`
RemoteAddr string `json:"remote_addr"`
Error string `json:"error"`
2017-03-08 19:03:47 +01:00
}
2017-06-11 11:22:05 +02:00
type CloseProxy struct {
ProxyName string `json:"proxy_name"`
}
2017-03-08 19:03:47 +01:00
type NewWorkConn struct {
RunId string `json:"run_id"`
PrivilegeKey string `json:"privilege_key"`
Timestamp int64 `json:"timestamp"`
2017-03-08 19:03:47 +01:00
}
type ReqWorkConn struct {
}
type StartWorkConn struct {
ProxyName string `json:"proxy_name"`
2019-03-29 12:01:18 +01:00
SrcAddr string `json:"src_addr"`
DstAddr string `json:"dst_addr"`
SrcPort uint16 `json:"src_port"`
DstPort uint16 `json:"dst_port"`
Error string `json:"error"`
2017-03-08 19:03:47 +01:00
}
2017-12-04 18:34:33 +01:00
type NewVisitorConn struct {
2017-06-25 21:02:33 +02:00
ProxyName string `json:"proxy_name"`
SignKey string `json:"sign_key"`
Timestamp int64 `json:"timestamp"`
UseEncryption bool `json:"use_encryption"`
UseCompression bool `json:"use_compression"`
}
2017-12-04 18:34:33 +01:00
type NewVisitorConnResp struct {
2017-06-25 21:02:33 +02:00
ProxyName string `json:"proxy_name"`
Error string `json:"error"`
}
2017-03-08 19:03:47 +01:00
type Ping struct {
PrivilegeKey string `json:"privilege_key"`
Timestamp int64 `json:"timestamp"`
2017-03-08 19:03:47 +01:00
}
type Pong struct {
Error string `json:"error"`
2017-03-08 19:03:47 +01:00
}
2017-03-12 19:44:47 +01:00
type UdpPacket struct {
Content string `json:"c"`
LocalAddr *net.UDPAddr `json:"l"`
RemoteAddr *net.UDPAddr `json:"r"`
}
2017-10-24 12:20:07 +02:00
2017-12-04 18:34:33 +01:00
type NatHoleVisitor struct {
2017-10-24 12:20:07 +02:00
ProxyName string `json:"proxy_name"`
SignKey string `json:"sign_key"`
Timestamp int64 `json:"timestamp"`
}
type NatHoleClient struct {
ProxyName string `json:"proxy_name"`
Sid string `json:"sid"`
}
type NatHoleResp struct {
2017-12-04 18:34:33 +01:00
Sid string `json:"sid"`
VisitorAddr string `json:"visitor_addr"`
ClientAddr string `json:"client_addr"`
Error string `json:"error"`
2017-10-24 12:20:07 +02:00
}
2019-03-11 08:53:58 +01:00
type NatHoleClientDetectOK struct {
}
2017-10-24 12:20:07 +02:00
type NatHoleSid struct {
2017-12-11 15:46:45 +01:00
Sid string `json:"sid"`
2017-10-24 12:20:07 +02:00
}