frp/client/service.go

239 lines
5.7 KiB
Go
Raw Normal View History

2017-03-08 19:03:47 +01:00
// Copyright 2017 fatedier, fatedier@gmail.com
2016-12-18 18:22:21 +01:00
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
2017-03-08 19:03:47 +01:00
package client
2016-12-18 18:22:21 +01:00
import (
2019-03-11 07:14:31 +01:00
"crypto/tls"
2018-11-06 11:35:05 +01:00
"fmt"
"io/ioutil"
"runtime"
"sync"
"sync/atomic"
"time"
2019-02-01 12:26:10 +01:00
"github.com/fatedier/frp/assets"
2018-04-10 11:46:49 +02:00
"github.com/fatedier/frp/g"
"github.com/fatedier/frp/models/config"
2018-11-06 11:35:05 +01:00
"github.com/fatedier/frp/models/msg"
"github.com/fatedier/frp/utils/log"
2018-11-06 11:35:05 +01:00
frpNet "github.com/fatedier/frp/utils/net"
"github.com/fatedier/frp/utils/util"
"github.com/fatedier/frp/utils/version"
fmux "github.com/hashicorp/yamux"
)
2016-12-18 18:22:21 +01:00
2017-03-08 19:03:47 +01:00
type Service struct {
2018-11-06 11:35:05 +01:00
// uniq id got from frps, attach it in loginMsg
runId string
2017-03-08 19:03:47 +01:00
// manager control connection with server
2018-11-06 11:35:05 +01:00
ctl *Control
ctlMu sync.RWMutex
2017-03-08 19:03:47 +01:00
2018-11-06 11:35:05 +01:00
pxyCfgs map[string]config.ProxyConf
visitorCfgs map[string]config.VisitorConf
cfgMu sync.RWMutex
exit uint32 // 0 means not exit
2017-03-08 19:03:47 +01:00
closedCh chan int
}
2019-02-01 12:26:10 +01:00
func NewService(pxyCfgs map[string]config.ProxyConf, visitorCfgs map[string]config.VisitorConf) (svr *Service, err error) {
// Init assets
err = assets.Load("")
if err != nil {
err = fmt.Errorf("Load assets error: %v", err)
return
}
2017-03-08 19:03:47 +01:00
svr = &Service{
2018-11-06 11:35:05 +01:00
pxyCfgs: pxyCfgs,
visitorCfgs: visitorCfgs,
exit: 0,
closedCh: make(chan int),
2016-12-18 18:22:21 +01:00
}
return
}
2017-03-08 19:03:47 +01:00
2018-11-06 11:35:05 +01:00
func (svr *Service) GetController() *Control {
svr.ctlMu.RLock()
defer svr.ctlMu.RUnlock()
return svr.ctl
}
2017-03-08 19:03:47 +01:00
func (svr *Service) Run() error {
2018-11-06 11:35:05 +01:00
// first login
for {
conn, session, err := svr.login()
if err != nil {
log.Warn("login to server failed: %v", err)
// if login_fail_exit is true, just exit this program
// otherwise sleep a while and try again to connect to server
if g.GlbClientCfg.LoginFailExit {
return err
} else {
time.Sleep(10 * time.Second)
}
} else {
// login success
ctl := NewControl(svr.runId, conn, session, svr.pxyCfgs, svr.visitorCfgs)
ctl.Run()
svr.ctlMu.Lock()
svr.ctl = ctl
svr.ctlMu.Unlock()
break
}
2017-03-08 19:03:47 +01:00
}
2018-11-06 11:35:05 +01:00
go svr.keepControllerWorking()
2018-04-10 11:46:49 +02:00
if g.GlbClientCfg.AdminPort != 0 {
2018-11-06 11:35:05 +01:00
err := svr.RunAdminServer(g.GlbClientCfg.AdminAddr, g.GlbClientCfg.AdminPort)
if err != nil {
log.Warn("run admin server error: %v", err)
}
2018-04-10 11:46:49 +02:00
log.Info("admin server listen on %s:%d", g.GlbClientCfg.AdminAddr, g.GlbClientCfg.AdminPort)
}
2017-03-08 19:03:47 +01:00
<-svr.closedCh
return nil
}
2017-06-26 19:59:30 +02:00
2018-11-06 11:35:05 +01:00
func (svr *Service) keepControllerWorking() {
maxDelayTime := 20 * time.Second
delayTime := time.Second
for {
<-svr.ctl.ClosedDoneCh()
if atomic.LoadUint32(&svr.exit) != 0 {
return
}
for {
log.Info("try to reconnect to server...")
conn, session, err := svr.login()
if err != nil {
log.Warn("reconnect to server error: %v", err)
time.Sleep(delayTime)
delayTime = delayTime * 2
if delayTime > maxDelayTime {
delayTime = maxDelayTime
}
continue
}
// reconnect success, init delayTime
delayTime = time.Second
ctl := NewControl(svr.runId, conn, session, svr.pxyCfgs, svr.visitorCfgs)
ctl.Run()
svr.ctlMu.Lock()
svr.ctl = ctl
svr.ctlMu.Unlock()
break
}
}
}
// login creates a connection to frps and registers it self as a client
// conn: control connection
// session: if it's not nil, using tcp mux
func (svr *Service) login() (conn frpNet.Conn, session *fmux.Session, err error) {
2019-03-11 07:14:31 +01:00
var tlsConfig *tls.Config
if g.GlbClientCfg.TLSEnable {
tlsConfig = &tls.Config{
InsecureSkipVerify: true,
}
}
conn, err = frpNet.ConnectServerByProxyWithTLS(g.GlbClientCfg.HttpProxy, g.GlbClientCfg.Protocol,
fmt.Sprintf("%s:%d", g.GlbClientCfg.ServerAddr, g.GlbClientCfg.ServerPort), tlsConfig)
2018-11-06 11:35:05 +01:00
if err != nil {
return
}
defer func() {
if err != nil {
conn.Close()
}
}()
if g.GlbClientCfg.TcpMux {
fmuxCfg := fmux.DefaultConfig()
2018-12-11 08:06:54 +01:00
fmuxCfg.KeepAliveInterval = 20 * time.Second
2018-11-06 11:35:05 +01:00
fmuxCfg.LogOutput = ioutil.Discard
session, err = fmux.Client(conn, fmuxCfg)
if err != nil {
return
}
stream, errRet := session.OpenStream()
if errRet != nil {
session.Close()
err = errRet
return
}
conn = frpNet.WrapConn(stream)
}
now := time.Now().Unix()
loginMsg := &msg.Login{
Arch: runtime.GOARCH,
Os: runtime.GOOS,
PoolCount: g.GlbClientCfg.PoolCount,
User: g.GlbClientCfg.User,
Version: version.Full(),
PrivilegeKey: util.GetAuthKey(g.GlbClientCfg.Token, now),
Timestamp: now,
RunId: svr.runId,
}
if err = msg.WriteMsg(conn, loginMsg); err != nil {
return
}
var loginRespMsg msg.LoginResp
conn.SetReadDeadline(time.Now().Add(10 * time.Second))
if err = msg.ReadMsgInto(conn, &loginRespMsg); err != nil {
return
}
conn.SetReadDeadline(time.Time{})
if loginRespMsg.Error != "" {
err = fmt.Errorf("%s", loginRespMsg.Error)
log.Error("%s", loginRespMsg.Error)
return
}
svr.runId = loginRespMsg.RunId
g.GlbClientCfg.ServerUdpPort = loginRespMsg.ServerUdpPort
log.Info("login to server success, get run id [%s], server udp port [%d]", loginRespMsg.RunId, loginRespMsg.ServerUdpPort)
return
}
func (svr *Service) ReloadConf(pxyCfgs map[string]config.ProxyConf, visitorCfgs map[string]config.VisitorConf) error {
svr.cfgMu.Lock()
svr.pxyCfgs = pxyCfgs
svr.visitorCfgs = visitorCfgs
svr.cfgMu.Unlock()
return svr.ctl.ReloadConf(pxyCfgs, visitorCfgs)
}
2018-01-16 18:09:33 +01:00
func (svr *Service) Close() {
2018-11-06 11:35:05 +01:00
atomic.StoreUint32(&svr.exit, 1)
2018-01-16 18:09:33 +01:00
svr.ctl.Close()
2018-11-06 11:35:05 +01:00
close(svr.closedCh)
2017-06-26 19:59:30 +02:00
}