|
|
|
// Copyright 2017 fatedier, fatedier@gmail.com
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package server
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"sync"
|
|
|
|
|
|
|
|
frpIo "github.com/fatedier/frp/utils/io"
|
|
|
|
frpNet "github.com/fatedier/frp/utils/net"
|
|
|
|
"github.com/fatedier/frp/utils/util"
|
|
|
|
)
|
|
|
|
|
|
|
|
type ControlManager struct {
|
|
|
|
// controls indexed by run id
|
|
|
|
ctlsByRunId map[string]*Control
|
|
|
|
|
|
|
|
mu sync.RWMutex
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewControlManager() *ControlManager {
|
|
|
|
return &ControlManager{
|
|
|
|
ctlsByRunId: make(map[string]*Control),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cm *ControlManager) Add(runId string, ctl *Control) (oldCtl *Control) {
|
|
|
|
cm.mu.Lock()
|
|
|
|
defer cm.mu.Unlock()
|
|
|
|
|
|
|
|
oldCtl, ok := cm.ctlsByRunId[runId]
|
|
|
|
if ok {
|
|
|
|
oldCtl.Replaced(ctl)
|
|
|
|
}
|
|
|
|
cm.ctlsByRunId[runId] = ctl
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cm *ControlManager) GetById(runId string) (ctl *Control, ok bool) {
|
|
|
|
cm.mu.RLock()
|
|
|
|
defer cm.mu.RUnlock()
|
|
|
|
ctl, ok = cm.ctlsByRunId[runId]
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
type ProxyManager struct {
|
|
|
|
// proxies indexed by proxy name
|
|
|
|
pxys map[string]Proxy
|
|
|
|
|
|
|
|
mu sync.RWMutex
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewProxyManager() *ProxyManager {
|
|
|
|
return &ProxyManager{
|
|
|
|
pxys: make(map[string]Proxy),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (pm *ProxyManager) Add(name string, pxy Proxy) error {
|
|
|
|
pm.mu.Lock()
|
|
|
|
defer pm.mu.Unlock()
|
|
|
|
if _, ok := pm.pxys[name]; ok {
|
|
|
|
return fmt.Errorf("proxy name [%s] is already in use", name)
|
|
|
|
}
|
|
|
|
|
|
|
|
pm.pxys[name] = pxy
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (pm *ProxyManager) Del(name string) {
|
|
|
|
pm.mu.Lock()
|
|
|
|
defer pm.mu.Unlock()
|
|
|
|
delete(pm.pxys, name)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (pm *ProxyManager) GetByName(name string) (pxy Proxy, ok bool) {
|
|
|
|
pm.mu.RLock()
|
|
|
|
defer pm.mu.RUnlock()
|
|
|
|
pxy, ok = pm.pxys[name]
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Manager for vistor listeners.
|
|
|
|
type VistorManager struct {
|
|
|
|
vistorListeners map[string]*frpNet.CustomListener
|
|
|
|
skMap map[string]string
|
|
|
|
|
|
|
|
mu sync.RWMutex
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewVistorManager() *VistorManager {
|
|
|
|
return &VistorManager{
|
|
|
|
vistorListeners: make(map[string]*frpNet.CustomListener),
|
|
|
|
skMap: make(map[string]string),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vm *VistorManager) Listen(name string, sk string) (l *frpNet.CustomListener, err error) {
|
|
|
|
vm.mu.Lock()
|
|
|
|
defer vm.mu.Unlock()
|
|
|
|
|
|
|
|
if _, ok := vm.vistorListeners[name]; ok {
|
|
|
|
err = fmt.Errorf("custom listener for [%s] is repeated", name)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
l = frpNet.NewCustomListener()
|
|
|
|
vm.vistorListeners[name] = l
|
|
|
|
vm.skMap[name] = sk
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vm *VistorManager) NewConn(name string, conn frpNet.Conn, timestamp int64, signKey string,
|
|
|
|
useEncryption bool, useCompression bool) (err error) {
|
|
|
|
|
|
|
|
vm.mu.RLock()
|
|
|
|
defer vm.mu.RUnlock()
|
|
|
|
|
|
|
|
if l, ok := vm.vistorListeners[name]; ok {
|
|
|
|
var sk string
|
|
|
|
if sk = vm.skMap[name]; util.GetAuthKey(sk, timestamp) != signKey {
|
|
|
|
err = fmt.Errorf("vistor connection of [%s] auth failed", name)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var rwc io.ReadWriteCloser = conn
|
|
|
|
if useEncryption {
|
|
|
|
if rwc, err = frpIo.WithEncryption(rwc, []byte(sk)); err != nil {
|
|
|
|
err = fmt.Errorf("create encryption connection failed: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if useCompression {
|
|
|
|
rwc = frpIo.WithCompression(rwc)
|
|
|
|
}
|
|
|
|
err = l.PutConn(frpNet.WrapReadWriteCloserToConn(rwc))
|
|
|
|
} else {
|
|
|
|
err = fmt.Errorf("custom listener for [%s] doesn't exist", name)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vm *VistorManager) CloseListener(name string) {
|
|
|
|
vm.mu.Lock()
|
|
|
|
defer vm.mu.Unlock()
|
|
|
|
|
|
|
|
delete(vm.vistorListeners, name)
|
|
|
|
delete(vm.skMap, name)
|
|
|
|
}
|