123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411 |
- // Copyright 2017 fatedier, fatedier@gmail.com
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package client
- import (
- "context"
- "errors"
- "fmt"
- "net"
- "os"
- "runtime"
- "sync"
- "time"
- "github.com/fatedier/golib/crypto"
- "github.com/samber/lo"
- "github.com/fatedier/frp/client/proxy"
- "github.com/fatedier/frp/pkg/auth"
- v1 "github.com/fatedier/frp/pkg/config/v1"
- "github.com/fatedier/frp/pkg/msg"
- httppkg "github.com/fatedier/frp/pkg/util/http"
- "github.com/fatedier/frp/pkg/util/log"
- netpkg "github.com/fatedier/frp/pkg/util/net"
- "github.com/fatedier/frp/pkg/util/version"
- "github.com/fatedier/frp/pkg/util/wait"
- "github.com/fatedier/frp/pkg/util/xlog"
- )
- func init() {
- crypto.DefaultSalt = "frp"
- // Disable quic-go's receive buffer warning.
- os.Setenv("QUIC_GO_DISABLE_RECEIVE_BUFFER_WARNING", "true")
- // Disable quic-go's ECN support by default. It may cause issues on certain operating systems.
- if os.Getenv("QUIC_GO_DISABLE_ECN") == "" {
- os.Setenv("QUIC_GO_DISABLE_ECN", "true")
- }
- }
- type cancelErr struct {
- Err error
- }
- func (e cancelErr) Error() string {
- return e.Err.Error()
- }
- // ServiceOptions contains options for creating a new client service.
- type ServiceOptions struct {
- Common *v1.ClientCommonConfig
- ProxyCfgs []v1.ProxyConfigurer
- VisitorCfgs []v1.VisitorConfigurer
- // ConfigFilePath is the path to the configuration file used to initialize.
- // If it is empty, it means that the configuration file is not used for initialization.
- // It may be initialized using command line parameters or called directly.
- ConfigFilePath string
- // ClientSpec is the client specification that control the client behavior.
- ClientSpec *msg.ClientSpec
- // ConnectorCreator is a function that creates a new connector to make connections to the server.
- // The Connector shields the underlying connection details, whether it is through TCP or QUIC connection,
- // and regardless of whether multiplexing is used.
- //
- // If it is not set, the default frpc connector will be used.
- // By using a custom Connector, it can be used to implement a VirtualClient, which connects to frps
- // through a pipe instead of a real physical connection.
- ConnectorCreator func(context.Context, *v1.ClientCommonConfig) Connector
- // HandleWorkConnCb is a callback function that is called when a new work connection is created.
- //
- // If it is not set, the default frpc implementation will be used.
- HandleWorkConnCb func(*v1.ProxyBaseConfig, net.Conn, *msg.StartWorkConn) bool
- }
- // setServiceOptionsDefault sets the default values for ServiceOptions.
- func setServiceOptionsDefault(options *ServiceOptions) {
- if options.Common != nil {
- options.Common.Complete()
- }
- if options.ConnectorCreator == nil {
- options.ConnectorCreator = NewConnector
- }
- }
- // Service is the client service that connects to frps and provides proxy services.
- type Service struct {
- ctlMu sync.RWMutex
- // manager control connection with server
- ctl *Control
- // Uniq id got from frps, it will be attached to loginMsg.
- runID string
- // Sets authentication based on selected method
- authSetter auth.Setter
- // web server for admin UI and apis
- webServer *httppkg.Server
- cfgMu sync.RWMutex
- common *v1.ClientCommonConfig
- proxyCfgs []v1.ProxyConfigurer
- visitorCfgs []v1.VisitorConfigurer
- clientSpec *msg.ClientSpec
- // The configuration file used to initialize this client, or an empty
- // string if no configuration file was used.
- configFilePath string
- // service context
- ctx context.Context
- // call cancel to stop service
- cancel context.CancelCauseFunc
- gracefulShutdownDuration time.Duration
- connectorCreator func(context.Context, *v1.ClientCommonConfig) Connector
- handleWorkConnCb func(*v1.ProxyBaseConfig, net.Conn, *msg.StartWorkConn) bool
- }
- func NewService(options ServiceOptions) (*Service, error) {
- setServiceOptionsDefault(&options)
- var webServer *httppkg.Server
- if options.Common.WebServer.Port > 0 {
- ws, err := httppkg.NewServer(options.Common.WebServer)
- if err != nil {
- return nil, err
- }
- webServer = ws
- }
- s := &Service{
- ctx: context.Background(),
- authSetter: auth.NewAuthSetter(options.Common.Auth),
- webServer: webServer,
- common: options.Common,
- configFilePath: options.ConfigFilePath,
- proxyCfgs: options.ProxyCfgs,
- visitorCfgs: options.VisitorCfgs,
- clientSpec: options.ClientSpec,
- connectorCreator: options.ConnectorCreator,
- handleWorkConnCb: options.HandleWorkConnCb,
- }
- if webServer != nil {
- webServer.RouteRegister(s.registerRouteHandlers)
- }
- return s, nil
- }
- func (svr *Service) Run(ctx context.Context) error {
- ctx, cancel := context.WithCancelCause(ctx)
- svr.ctx = xlog.NewContext(ctx, xlog.FromContextSafe(ctx))
- svr.cancel = cancel
- // set custom DNSServer
- if svr.common.DNSServer != "" {
- netpkg.SetDefaultDNSAddress(svr.common.DNSServer)
- }
- if svr.webServer != nil {
- go func() {
- log.Infof("admin server listen on %s", svr.webServer.Address())
- if err := svr.webServer.Run(); err != nil {
- log.Warnf("admin server exit with error: %v", err)
- }
- }()
- }
- // first login to frps
- svr.loopLoginUntilSuccess(10*time.Second, lo.FromPtr(svr.common.LoginFailExit))
- if svr.ctl == nil {
- cancelCause := cancelErr{}
- _ = errors.As(context.Cause(svr.ctx), &cancelCause)
- return fmt.Errorf("login to the server failed: %v. With loginFailExit enabled, no additional retries will be attempted", cancelCause.Err)
- }
- go svr.keepControllerWorking()
- <-svr.ctx.Done()
- svr.stop()
- return nil
- }
- func (svr *Service) keepControllerWorking() {
- <-svr.ctl.Done()
- // There is a situation where the login is successful but due to certain reasons,
- // the control immediately exits. It is necessary to limit the frequency of reconnection in this case.
- // The interval for the first three retries in 1 minute will be very short, and then it will increase exponentially.
- // The maximum interval is 20 seconds.
- wait.BackoffUntil(func() (bool, error) {
- // loopLoginUntilSuccess is another layer of loop that will continuously attempt to
- // login to the server until successful.
- svr.loopLoginUntilSuccess(20*time.Second, false)
- if svr.ctl != nil {
- <-svr.ctl.Done()
- return false, errors.New("control is closed and try another loop")
- }
- // If the control is nil, it means that the login failed and the service is also closed.
- return false, nil
- }, wait.NewFastBackoffManager(
- wait.FastBackoffOptions{
- Duration: time.Second,
- Factor: 2,
- Jitter: 0.1,
- MaxDuration: 20 * time.Second,
- FastRetryCount: 3,
- FastRetryDelay: 200 * time.Millisecond,
- FastRetryWindow: time.Minute,
- FastRetryJitter: 0.5,
- },
- ), true, svr.ctx.Done())
- }
- // login creates a connection to frps and registers it self as a client
- // conn: control connection
- // session: if it's not nil, using tcp mux
- func (svr *Service) login() (conn net.Conn, connector Connector, err error) {
- xl := xlog.FromContextSafe(svr.ctx)
- connector = svr.connectorCreator(svr.ctx, svr.common)
- if err = connector.Open(); err != nil {
- return nil, nil, err
- }
- defer func() {
- if err != nil {
- connector.Close()
- }
- }()
- conn, err = connector.Connect()
- if err != nil {
- return
- }
- loginMsg := &msg.Login{
- Arch: runtime.GOARCH,
- Os: runtime.GOOS,
- PoolCount: svr.common.Transport.PoolCount,
- User: svr.common.User,
- Version: version.Full(),
- Timestamp: time.Now().Unix(),
- RunID: svr.runID,
- Metas: svr.common.Metadatas,
- }
- if svr.clientSpec != nil {
- loginMsg.ClientSpec = *svr.clientSpec
- }
- // Add auth
- if err = svr.authSetter.SetLogin(loginMsg); err != nil {
- return
- }
- if err = msg.WriteMsg(conn, loginMsg); err != nil {
- return
- }
- var loginRespMsg msg.LoginResp
- _ = conn.SetReadDeadline(time.Now().Add(10 * time.Second))
- if err = msg.ReadMsgInto(conn, &loginRespMsg); err != nil {
- return
- }
- _ = conn.SetReadDeadline(time.Time{})
- if loginRespMsg.Error != "" {
- err = fmt.Errorf("%s", loginRespMsg.Error)
- xl.Errorf("%s", loginRespMsg.Error)
- return
- }
- svr.runID = loginRespMsg.RunID
- xl.AddPrefix(xlog.LogPrefix{Name: "runID", Value: svr.runID})
- xl.Infof("login to server success, get run id [%s]", loginRespMsg.RunID)
- return
- }
- func (svr *Service) loopLoginUntilSuccess(maxInterval time.Duration, firstLoginExit bool) {
- xl := xlog.FromContextSafe(svr.ctx)
- loginFunc := func() (bool, error) {
- xl.Infof("try to connect to server...")
- conn, connector, err := svr.login()
- if err != nil {
- xl.Warnf("connect to server error: %v", err)
- if firstLoginExit {
- svr.cancel(cancelErr{Err: err})
- }
- return false, err
- }
- svr.cfgMu.RLock()
- proxyCfgs := svr.proxyCfgs
- visitorCfgs := svr.visitorCfgs
- svr.cfgMu.RUnlock()
- connEncrypted := true
- if svr.clientSpec != nil && svr.clientSpec.Type == "ssh-tunnel" {
- connEncrypted = false
- }
- sessionCtx := &SessionContext{
- Common: svr.common,
- RunID: svr.runID,
- Conn: conn,
- ConnEncrypted: connEncrypted,
- AuthSetter: svr.authSetter,
- Connector: connector,
- }
- ctl, err := NewControl(svr.ctx, sessionCtx)
- if err != nil {
- conn.Close()
- xl.Errorf("NewControl error: %v", err)
- return false, err
- }
- ctl.SetInWorkConnCallback(svr.handleWorkConnCb)
- ctl.Run(proxyCfgs, visitorCfgs)
- // close and replace previous control
- svr.ctlMu.Lock()
- if svr.ctl != nil {
- svr.ctl.Close()
- }
- svr.ctl = ctl
- svr.ctlMu.Unlock()
- return true, nil
- }
- // try to reconnect to server until success
- wait.BackoffUntil(loginFunc, wait.NewFastBackoffManager(
- wait.FastBackoffOptions{
- Duration: time.Second,
- Factor: 2,
- Jitter: 0.1,
- MaxDuration: maxInterval,
- }), true, svr.ctx.Done())
- }
- func (svr *Service) UpdateAllConfigurer(proxyCfgs []v1.ProxyConfigurer, visitorCfgs []v1.VisitorConfigurer) error {
- svr.cfgMu.Lock()
- svr.proxyCfgs = proxyCfgs
- svr.visitorCfgs = visitorCfgs
- svr.cfgMu.Unlock()
- svr.ctlMu.RLock()
- ctl := svr.ctl
- svr.ctlMu.RUnlock()
- if ctl != nil {
- return svr.ctl.UpdateAllConfigurer(proxyCfgs, visitorCfgs)
- }
- return nil
- }
- func (svr *Service) Close() {
- svr.GracefulClose(time.Duration(0))
- }
- func (svr *Service) GracefulClose(d time.Duration) {
- svr.gracefulShutdownDuration = d
- svr.cancel(nil)
- }
- func (svr *Service) stop() {
- svr.ctlMu.Lock()
- defer svr.ctlMu.Unlock()
- if svr.ctl != nil {
- svr.ctl.GracefulClose(svr.gracefulShutdownDuration)
- svr.ctl = nil
- }
- }
- func (svr *Service) getProxyStatus(name string) (*proxy.WorkingStatus, bool) {
- svr.ctlMu.RLock()
- ctl := svr.ctl
- svr.ctlMu.RUnlock()
- if ctl == nil {
- return nil, false
- }
- return ctl.pm.GetProxyStatus(name)
- }
- func (svr *Service) StatusExporter() StatusExporter {
- return &statusExporterImpl{
- getProxyStatusFunc: svr.getProxyStatus,
- }
- }
- type StatusExporter interface {
- GetProxyStatus(name string) (*proxy.WorkingStatus, bool)
- }
- type statusExporterImpl struct {
- getProxyStatusFunc func(name string) (*proxy.WorkingStatus, bool)
- }
- func (s *statusExporterImpl) GetProxyStatus(name string) (*proxy.WorkingStatus, bool) {
- return s.getProxyStatusFunc(name)
- }
|