123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338 |
- // Copyright 2017 fatedier, fatedier@gmail.com
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package proxy
- import (
- "context"
- "fmt"
- "io"
- "net"
- "strconv"
- "sync"
- "time"
- "github.com/fatedier/frp/pkg/config"
- "github.com/fatedier/frp/pkg/msg"
- plugin "github.com/fatedier/frp/pkg/plugin/server"
- frpNet "github.com/fatedier/frp/pkg/util/net"
- "github.com/fatedier/frp/pkg/util/xlog"
- "github.com/fatedier/frp/server/controller"
- "github.com/fatedier/frp/server/metrics"
- frpIo "github.com/fatedier/golib/io"
- )
- type GetWorkConnFn func() (net.Conn, error)
- type Proxy interface {
- Context() context.Context
- Run() (remoteAddr string, err error)
- GetName() string
- GetConf() config.ProxyConf
- GetWorkConnFromPool(src, dst net.Addr) (workConn net.Conn, err error)
- GetUsedPortsNum() int
- GetResourceController() *controller.ResourceController
- GetUserInfo() plugin.UserInfo
- Close()
- }
- type BaseProxy struct {
- name string
- rc *controller.ResourceController
- listeners []net.Listener
- usedPortsNum int
- poolCount int
- getWorkConnFn GetWorkConnFn
- serverCfg config.ServerCommonConf
- userInfo plugin.UserInfo
- mu sync.RWMutex
- xl *xlog.Logger
- ctx context.Context
- }
- func (pxy *BaseProxy) GetName() string {
- return pxy.name
- }
- func (pxy *BaseProxy) Context() context.Context {
- return pxy.ctx
- }
- func (pxy *BaseProxy) GetUsedPortsNum() int {
- return pxy.usedPortsNum
- }
- func (pxy *BaseProxy) GetResourceController() *controller.ResourceController {
- return pxy.rc
- }
- func (pxy *BaseProxy) GetUserInfo() plugin.UserInfo {
- return pxy.userInfo
- }
- func (pxy *BaseProxy) Close() {
- xl := xlog.FromContextSafe(pxy.ctx)
- xl.Info("proxy closing")
- for _, l := range pxy.listeners {
- l.Close()
- }
- }
- // GetWorkConnFromPool try to get a new work connections from pool
- // for quickly response, we immediately send the StartWorkConn message to frpc after take out one from pool
- func (pxy *BaseProxy) GetWorkConnFromPool(src, dst net.Addr) (workConn net.Conn, err error) {
- xl := xlog.FromContextSafe(pxy.ctx)
- // try all connections from the pool
- for i := 0; i < pxy.poolCount+1; i++ {
- if workConn, err = pxy.getWorkConnFn(); err != nil {
- xl.Warn("failed to get work connection: %v", err)
- return
- }
- xl.Debug("get a new work connection: [%s]", workConn.RemoteAddr().String())
- xl.Spawn().AppendPrefix(pxy.GetName())
- workConn = frpNet.NewContextConn(pxy.ctx, workConn)
- var (
- srcAddr string
- dstAddr string
- srcPortStr string
- dstPortStr string
- srcPort int
- dstPort int
- )
- if src != nil {
- srcAddr, srcPortStr, _ = net.SplitHostPort(src.String())
- srcPort, _ = strconv.Atoi(srcPortStr)
- }
- if dst != nil {
- dstAddr, dstPortStr, _ = net.SplitHostPort(dst.String())
- dstPort, _ = strconv.Atoi(dstPortStr)
- }
- err := msg.WriteMsg(workConn, &msg.StartWorkConn{
- ProxyName: pxy.GetName(),
- SrcAddr: srcAddr,
- SrcPort: uint16(srcPort),
- DstAddr: dstAddr,
- DstPort: uint16(dstPort),
- Error: "",
- })
- if err != nil {
- xl.Warn("failed to send message to work connection from pool: %v, times: %d", err, i)
- workConn.Close()
- } else {
- break
- }
- }
- if err != nil {
- xl.Error("try to get work connection failed in the end")
- return
- }
- return
- }
- // startListenHandler start a goroutine handler for each listener.
- // p: p will just be passed to handler(Proxy, frpNet.Conn).
- // handler: each proxy type can set different handler function to deal with connections accepted from listeners.
- func (pxy *BaseProxy) startListenHandler(p Proxy, handler func(Proxy, net.Conn, config.ServerCommonConf)) {
- xl := xlog.FromContextSafe(pxy.ctx)
- for _, listener := range pxy.listeners {
- go func(l net.Listener) {
- var tempDelay time.Duration // how long to sleep on accept failure
- for {
- // block
- // if listener is closed, err returned
- c, err := l.Accept()
- if err != nil {
- if err, ok := err.(interface{ Temporary() bool }); ok && err.Temporary() {
- if tempDelay == 0 {
- tempDelay = 5 * time.Millisecond
- } else {
- tempDelay *= 2
- }
- if max := 1 * time.Second; tempDelay > max {
- tempDelay = max
- }
- xl.Info("met temporary error: %s, sleep for %s ...", err, tempDelay)
- time.Sleep(tempDelay)
- continue
- }
- xl.Warn("listener is closed: %s", err)
- return
- }
- xl.Info("get a user connection [%s]", c.RemoteAddr().String())
- go handler(p, c, pxy.serverCfg)
- }
- }(listener)
- }
- }
- func NewProxy(ctx context.Context, userInfo plugin.UserInfo, rc *controller.ResourceController, poolCount int,
- getWorkConnFn GetWorkConnFn, pxyConf config.ProxyConf, serverCfg config.ServerCommonConf) (pxy Proxy, err error) {
- xl := xlog.FromContextSafe(ctx).Spawn().AppendPrefix(pxyConf.GetBaseInfo().ProxyName)
- basePxy := BaseProxy{
- name: pxyConf.GetBaseInfo().ProxyName,
- rc: rc,
- listeners: make([]net.Listener, 0),
- poolCount: poolCount,
- getWorkConnFn: getWorkConnFn,
- serverCfg: serverCfg,
- xl: xl,
- ctx: xlog.NewContext(ctx, xl),
- userInfo: userInfo,
- }
- switch cfg := pxyConf.(type) {
- case *config.TCPProxyConf:
- basePxy.usedPortsNum = 1
- pxy = &TCPProxy{
- BaseProxy: &basePxy,
- cfg: cfg,
- }
- case *config.TCPMuxProxyConf:
- pxy = &TCPMuxProxy{
- BaseProxy: &basePxy,
- cfg: cfg,
- }
- case *config.HTTPProxyConf:
- pxy = &HTTPProxy{
- BaseProxy: &basePxy,
- cfg: cfg,
- }
- case *config.HTTPSProxyConf:
- pxy = &HTTPSProxy{
- BaseProxy: &basePxy,
- cfg: cfg,
- }
- case *config.UDPProxyConf:
- basePxy.usedPortsNum = 1
- pxy = &UDPProxy{
- BaseProxy: &basePxy,
- cfg: cfg,
- }
- case *config.STCPProxyConf:
- pxy = &STCPProxy{
- BaseProxy: &basePxy,
- cfg: cfg,
- }
- case *config.XTCPProxyConf:
- pxy = &XTCPProxy{
- BaseProxy: &basePxy,
- cfg: cfg,
- }
- case *config.SUDPProxyConf:
- pxy = &SUDPProxy{
- BaseProxy: &basePxy,
- cfg: cfg,
- }
- default:
- return pxy, fmt.Errorf("proxy type not support")
- }
- return
- }
- // HandleUserTCPConnection is used for incoming user TCP connections.
- // It can be used for tcp, http, https type.
- func HandleUserTCPConnection(pxy Proxy, userConn net.Conn, serverCfg config.ServerCommonConf) {
- xl := xlog.FromContextSafe(pxy.Context())
- defer userConn.Close()
- // server plugin hook
- rc := pxy.GetResourceController()
- content := &plugin.NewUserConnContent{
- User: pxy.GetUserInfo(),
- ProxyName: pxy.GetName(),
- ProxyType: pxy.GetConf().GetBaseInfo().ProxyType,
- RemoteAddr: userConn.RemoteAddr().String(),
- }
- _, err := rc.PluginManager.NewUserConn(content)
- if err != nil {
- xl.Warn("the user conn [%s] was rejected, err:%v", content.RemoteAddr, err)
- return
- }
- // try all connections from the pool
- workConn, err := pxy.GetWorkConnFromPool(userConn.RemoteAddr(), userConn.LocalAddr())
- if err != nil {
- return
- }
- defer workConn.Close()
- var local io.ReadWriteCloser = workConn
- cfg := pxy.GetConf().GetBaseInfo()
- xl.Trace("handler user tcp connection, use_encryption: %t, use_compression: %t", cfg.UseEncryption, cfg.UseCompression)
- if cfg.UseEncryption {
- local, err = frpIo.WithEncryption(local, []byte(serverCfg.Token))
- if err != nil {
- xl.Error("create encryption stream error: %v", err)
- return
- }
- }
- if cfg.UseCompression {
- local = frpIo.WithCompression(local)
- }
- xl.Debug("join connections, workConn(l[%s] r[%s]) userConn(l[%s] r[%s])", workConn.LocalAddr().String(),
- workConn.RemoteAddr().String(), userConn.LocalAddr().String(), userConn.RemoteAddr().String())
- name := pxy.GetName()
- proxyType := pxy.GetConf().GetBaseInfo().ProxyType
- metrics.Server.OpenConnection(name, proxyType)
- inCount, outCount := frpIo.Join(local, userConn)
- metrics.Server.CloseConnection(name, proxyType)
- metrics.Server.AddTrafficIn(name, proxyType, inCount)
- metrics.Server.AddTrafficOut(name, proxyType, outCount)
- xl.Debug("join connections closed")
- }
- type Manager struct {
- // proxies indexed by proxy name
- pxys map[string]Proxy
- mu sync.RWMutex
- }
- func NewManager() *Manager {
- return &Manager{
- pxys: make(map[string]Proxy),
- }
- }
- func (pm *Manager) Add(name string, pxy Proxy) error {
- pm.mu.Lock()
- defer pm.mu.Unlock()
- if _, ok := pm.pxys[name]; ok {
- return fmt.Errorf("proxy name [%s] is already in use", name)
- }
- pm.pxys[name] = pxy
- return nil
- }
- func (pm *Manager) Del(name string) {
- pm.mu.Lock()
- defer pm.mu.Unlock()
- delete(pm.pxys, name)
- }
- func (pm *Manager) GetByName(name string) (pxy Proxy, ok bool) {
- pm.mu.RLock()
- defer pm.mu.RUnlock()
- pxy, ok = pm.pxys[name]
- return
- }
|