frp/server/visitor/visitor.go

108 lines
2.6 KiB
Go
Raw Normal View History

2019-01-14 17:11:08 +01:00
// Copyright 2019 fatedier, fatedier@gmail.com
2017-03-22 19:01:25 +01:00
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
2020-05-24 05:28:57 +02:00
package visitor
2017-03-08 19:03:47 +01:00
import (
"fmt"
2017-06-25 21:02:33 +02:00
"io"
2019-10-12 14:13:12 +02:00
"net"
2017-03-08 19:03:47 +01:00
"sync"
2017-06-25 21:02:33 +02:00
2023-05-29 08:10:34 +02:00
libio "github.com/fatedier/golib/io"
"github.com/samber/lo"
2022-08-28 19:02:53 +02:00
2023-05-29 08:10:34 +02:00
utilnet "github.com/fatedier/frp/pkg/util/net"
2020-09-23 07:49:14 +02:00
"github.com/fatedier/frp/pkg/util/util"
2017-03-08 19:03:47 +01:00
)
type listenerBundle struct {
l *utilnet.InternalListener
sk string
allowUsers []string
}
2017-12-04 18:34:33 +01:00
// Manager for visitor listeners.
2020-05-24 11:48:37 +02:00
type Manager struct {
listeners map[string]*listenerBundle
2017-06-25 21:02:33 +02:00
mu sync.RWMutex
}
2020-05-24 11:48:37 +02:00
func NewManager() *Manager {
return &Manager{
listeners: make(map[string]*listenerBundle),
2017-06-25 21:02:33 +02:00
}
}
func (vm *Manager) Listen(name string, sk string, allowUsers []string) (l *utilnet.InternalListener, err error) {
2017-06-25 21:02:33 +02:00
vm.mu.Lock()
defer vm.mu.Unlock()
if _, ok := vm.listeners[name]; ok {
2017-06-25 21:02:33 +02:00
err = fmt.Errorf("custom listener for [%s] is repeated", name)
return
}
2023-05-29 08:10:34 +02:00
l = utilnet.NewInternalListener()
vm.listeners[name] = &listenerBundle{
l: l,
sk: sk,
allowUsers: allowUsers,
}
2017-06-25 21:02:33 +02:00
return
}
2020-05-24 11:48:37 +02:00
func (vm *Manager) NewConn(name string, conn net.Conn, timestamp int64, signKey string,
useEncryption bool, useCompression bool, visitorUser string,
2022-08-28 19:02:53 +02:00
) (err error) {
2017-06-25 21:02:33 +02:00
vm.mu.RLock()
defer vm.mu.RUnlock()
if l, ok := vm.listeners[name]; ok {
if util.GetAuthKey(l.sk, timestamp) != signKey {
2017-12-04 18:34:33 +01:00
err = fmt.Errorf("visitor connection of [%s] auth failed", name)
2017-06-25 21:02:33 +02:00
return
}
if !lo.Contains(l.allowUsers, visitorUser) && !lo.Contains(l.allowUsers, "*") {
err = fmt.Errorf("visitor connection of [%s] user [%s] not allowed", name, visitorUser)
return
}
2017-06-25 21:02:33 +02:00
var rwc io.ReadWriteCloser = conn
if useEncryption {
if rwc, err = libio.WithEncryption(rwc, []byte(l.sk)); err != nil {
2017-06-25 21:02:33 +02:00
err = fmt.Errorf("create encryption connection failed: %v", err)
return
}
}
if useCompression {
2023-05-29 08:10:34 +02:00
rwc = libio.WithCompression(rwc)
2017-06-25 21:02:33 +02:00
}
err = l.l.PutConn(utilnet.WrapReadWriteCloserToConn(rwc, conn))
2017-06-25 21:02:33 +02:00
} else {
err = fmt.Errorf("custom listener for [%s] doesn't exist", name)
return
}
return
}
2020-05-24 11:48:37 +02:00
func (vm *Manager) CloseListener(name string) {
2017-06-25 21:02:33 +02:00
vm.mu.Lock()
defer vm.mu.Unlock()
delete(vm.listeners, name)
2017-06-25 21:02:33 +02:00
}