2017-03-08 18:03:47 +00:00
|
|
|
// Copyright 2017 fatedier, fatedier@gmail.com
|
2016-12-18 17:22:21 +00:00
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2017-03-08 18:03:47 +00:00
|
|
|
package client
|
2016-12-18 17:22:21 +00:00
|
|
|
|
2017-07-12 18:20:49 +00:00
|
|
|
import (
|
2019-10-12 12:13:12 +00:00
|
|
|
"context"
|
2019-03-11 06:14:31 +00:00
|
|
|
"crypto/tls"
|
2023-11-06 02:51:48 +00:00
|
|
|
"errors"
|
2018-11-06 10:35:05 +00:00
|
|
|
"fmt"
|
2021-09-29 02:33:57 +00:00
|
|
|
"io"
|
2019-10-12 12:13:12 +00:00
|
|
|
"net"
|
2018-11-06 10:35:05 +00:00
|
|
|
"runtime"
|
2020-12-24 13:48:26 +00:00
|
|
|
"strconv"
|
2022-03-28 04:12:35 +00:00
|
|
|
"strings"
|
2018-11-06 10:35:05 +00:00
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
2022-08-28 17:02:53 +00:00
|
|
|
"github.com/fatedier/golib/crypto"
|
|
|
|
libdial "github.com/fatedier/golib/net/dial"
|
|
|
|
fmux "github.com/hashicorp/yamux"
|
2023-02-02 12:20:17 +00:00
|
|
|
quic "github.com/quic-go/quic-go"
|
2023-09-06 02:18:02 +00:00
|
|
|
"github.com/samber/lo"
|
2022-08-28 17:02:53 +00:00
|
|
|
|
2019-02-01 11:26:10 +00:00
|
|
|
"github.com/fatedier/frp/assets"
|
2020-09-23 05:49:14 +00:00
|
|
|
"github.com/fatedier/frp/pkg/auth"
|
2023-09-06 02:18:02 +00:00
|
|
|
v1 "github.com/fatedier/frp/pkg/config/v1"
|
2020-09-23 05:49:14 +00:00
|
|
|
"github.com/fatedier/frp/pkg/msg"
|
|
|
|
"github.com/fatedier/frp/pkg/transport"
|
|
|
|
"github.com/fatedier/frp/pkg/util/log"
|
2023-05-29 06:10:34 +00:00
|
|
|
utilnet "github.com/fatedier/frp/pkg/util/net"
|
2020-09-23 05:49:14 +00:00
|
|
|
"github.com/fatedier/frp/pkg/util/version"
|
2023-11-06 02:51:48 +00:00
|
|
|
"github.com/fatedier/frp/pkg/util/wait"
|
2020-09-23 05:49:14 +00:00
|
|
|
"github.com/fatedier/frp/pkg/util/xlog"
|
2017-07-12 18:20:49 +00:00
|
|
|
)
|
2016-12-18 17:22:21 +00:00
|
|
|
|
2022-03-28 04:12:35 +00:00
|
|
|
func init() {
|
|
|
|
crypto.DefaultSalt = "frp"
|
|
|
|
}
|
|
|
|
|
2019-08-24 22:20:34 +00:00
|
|
|
// Service is a client service.
|
2017-03-08 18:03:47 +00:00
|
|
|
type Service struct {
|
2018-11-06 10:35:05 +00:00
|
|
|
// uniq id got from frps, attach it in loginMsg
|
2020-05-24 09:48:37 +00:00
|
|
|
runID string
|
2018-11-06 10:35:05 +00:00
|
|
|
|
2017-03-08 18:03:47 +00:00
|
|
|
// manager control connection with server
|
2018-11-06 10:35:05 +00:00
|
|
|
ctl *Control
|
|
|
|
ctlMu sync.RWMutex
|
2017-03-08 18:03:47 +00:00
|
|
|
|
2020-03-01 02:57:01 +00:00
|
|
|
// Sets authentication based on selected method
|
|
|
|
authSetter auth.Setter
|
|
|
|
|
2023-09-06 02:18:02 +00:00
|
|
|
cfg *v1.ClientCommonConfig
|
|
|
|
pxyCfgs []v1.ProxyConfigurer
|
|
|
|
visitorCfgs []v1.VisitorConfigurer
|
2018-11-06 10:35:05 +00:00
|
|
|
cfgMu sync.RWMutex
|
|
|
|
|
2019-08-20 20:53:27 +00:00
|
|
|
// The configuration file used to initialize this client, or an empty
|
|
|
|
// string if no configuration file was used.
|
|
|
|
cfgFile string
|
|
|
|
|
2019-10-12 12:13:12 +00:00
|
|
|
// service context
|
|
|
|
ctx context.Context
|
|
|
|
// call cancel to stop service
|
2023-11-06 02:51:48 +00:00
|
|
|
cancel context.CancelFunc
|
|
|
|
gracefulDuration time.Duration
|
2017-03-08 18:03:47 +00:00
|
|
|
}
|
|
|
|
|
2022-08-28 17:02:53 +00:00
|
|
|
func NewService(
|
2023-09-06 02:18:02 +00:00
|
|
|
cfg *v1.ClientCommonConfig,
|
|
|
|
pxyCfgs []v1.ProxyConfigurer,
|
|
|
|
visitorCfgs []v1.VisitorConfigurer,
|
2022-08-28 17:02:53 +00:00
|
|
|
cfgFile string,
|
2023-11-01 09:06:55 +00:00
|
|
|
) *Service {
|
|
|
|
return &Service{
|
2023-11-16 13:03:36 +00:00
|
|
|
authSetter: auth.NewAuthSetter(cfg.Auth),
|
|
|
|
cfg: cfg,
|
|
|
|
cfgFile: cfgFile,
|
|
|
|
pxyCfgs: pxyCfgs,
|
|
|
|
visitorCfgs: visitorCfgs,
|
|
|
|
ctx: context.Background(),
|
2016-12-18 17:22:21 +00:00
|
|
|
}
|
|
|
|
}
|
2017-03-08 18:03:47 +00:00
|
|
|
|
2018-11-06 10:35:05 +00:00
|
|
|
func (svr *Service) GetController() *Control {
|
|
|
|
svr.ctlMu.RLock()
|
|
|
|
defer svr.ctlMu.RUnlock()
|
|
|
|
return svr.ctl
|
|
|
|
}
|
|
|
|
|
2023-06-29 10:04:20 +00:00
|
|
|
func (svr *Service) Run(ctx context.Context) error {
|
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
svr.ctx = xlog.NewContext(ctx, xlog.New())
|
|
|
|
svr.cancel = cancel
|
|
|
|
|
2022-03-28 04:12:35 +00:00
|
|
|
// set custom DNSServer
|
|
|
|
if svr.cfg.DNSServer != "" {
|
|
|
|
dnsAddr := svr.cfg.DNSServer
|
2023-01-29 15:54:40 +00:00
|
|
|
if _, _, err := net.SplitHostPort(dnsAddr); err != nil {
|
|
|
|
dnsAddr = net.JoinHostPort(dnsAddr, "53")
|
2022-03-28 04:12:35 +00:00
|
|
|
}
|
|
|
|
// Change default dns server for frpc
|
|
|
|
net.DefaultResolver = &net.Resolver{
|
|
|
|
PreferGo: true,
|
|
|
|
Dial: func(ctx context.Context, network, address string) (net.Conn, error) {
|
|
|
|
return net.Dial("udp", dnsAddr)
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-10-12 12:13:12 +00:00
|
|
|
// login to frps
|
2023-11-06 02:51:48 +00:00
|
|
|
svr.loopLoginUntilSuccess(10*time.Second, lo.FromPtr(svr.cfg.LoginFailExit))
|
|
|
|
if svr.ctl == nil {
|
|
|
|
return fmt.Errorf("the process exited because the first login to the server failed, and the loginFailExit feature is enabled")
|
2017-03-08 18:03:47 +00:00
|
|
|
}
|
|
|
|
|
2018-11-06 10:35:05 +00:00
|
|
|
go svr.keepControllerWorking()
|
|
|
|
|
2023-09-06 02:18:02 +00:00
|
|
|
if svr.cfg.WebServer.Port != 0 {
|
2019-08-16 18:02:00 +00:00
|
|
|
// Init admin server assets
|
2023-09-06 02:18:02 +00:00
|
|
|
assets.Load(svr.cfg.WebServer.AssetsDir)
|
2019-08-16 18:02:00 +00:00
|
|
|
|
2023-09-06 02:18:02 +00:00
|
|
|
address := net.JoinHostPort(svr.cfg.WebServer.Addr, strconv.Itoa(svr.cfg.WebServer.Port))
|
2021-08-17 12:20:04 +00:00
|
|
|
err := svr.RunAdminServer(address)
|
2017-07-12 18:20:49 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Warn("run admin server error: %v", err)
|
|
|
|
}
|
2023-09-06 02:18:02 +00:00
|
|
|
log.Info("admin server listen on %s:%d", svr.cfg.WebServer.Addr, svr.cfg.WebServer.Port)
|
2017-07-12 18:20:49 +00:00
|
|
|
}
|
2019-10-12 12:13:12 +00:00
|
|
|
<-svr.ctx.Done()
|
2023-11-06 02:51:48 +00:00
|
|
|
svr.stop()
|
2017-03-08 18:03:47 +00:00
|
|
|
return nil
|
|
|
|
}
|
2017-06-26 17:59:30 +00:00
|
|
|
|
2018-11-06 10:35:05 +00:00
|
|
|
func (svr *Service) keepControllerWorking() {
|
2023-11-06 02:51:48 +00:00
|
|
|
<-svr.ctl.Done()
|
|
|
|
|
|
|
|
// There is a situation where the login is successful but due to certain reasons,
|
|
|
|
// the control immediately exits. It is necessary to limit the frequency of reconnection in this case.
|
|
|
|
// The interval for the first three retries in 1 minute will be very short, and then it will increase exponentially.
|
|
|
|
// The maximum interval is 20 seconds.
|
|
|
|
wait.BackoffUntil(func() error {
|
|
|
|
// loopLoginUntilSuccess is another layer of loop that will continuously attempt to
|
|
|
|
// login to the server until successful.
|
|
|
|
svr.loopLoginUntilSuccess(20*time.Second, false)
|
|
|
|
<-svr.ctl.Done()
|
|
|
|
return errors.New("control is closed and try another loop")
|
|
|
|
}, wait.NewFastBackoffManager(
|
|
|
|
wait.FastBackoffOptions{
|
|
|
|
Duration: time.Second,
|
|
|
|
Factor: 2,
|
|
|
|
Jitter: 0.1,
|
|
|
|
MaxDuration: 20 * time.Second,
|
|
|
|
FastRetryCount: 3,
|
|
|
|
FastRetryDelay: 200 * time.Millisecond,
|
|
|
|
FastRetryWindow: time.Minute,
|
|
|
|
FastRetryJitter: 0.5,
|
|
|
|
},
|
|
|
|
), true, svr.ctx.Done())
|
2018-11-06 10:35:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// login creates a connection to frps and registers it self as a client
|
|
|
|
// conn: control connection
|
|
|
|
// session: if it's not nil, using tcp mux
|
2022-12-12 03:04:10 +00:00
|
|
|
func (svr *Service) login() (conn net.Conn, cm *ConnectionManager, err error) {
|
2019-10-12 12:13:12 +00:00
|
|
|
xl := xlog.FromContextSafe(svr.ctx)
|
2023-09-06 02:18:02 +00:00
|
|
|
cm = NewConnectionManager(svr.ctx, svr.cfg)
|
2021-03-07 06:57:23 +00:00
|
|
|
|
2022-12-12 03:04:10 +00:00
|
|
|
if err = cm.OpenConnection(); err != nil {
|
|
|
|
return nil, nil, err
|
2018-11-06 10:35:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
defer func() {
|
|
|
|
if err != nil {
|
2022-12-12 03:04:10 +00:00
|
|
|
cm.Close()
|
2018-11-06 10:35:05 +00:00
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
2022-12-12 03:04:10 +00:00
|
|
|
conn, err = cm.Connect()
|
|
|
|
if err != nil {
|
|
|
|
return
|
2018-11-06 10:35:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
loginMsg := &msg.Login{
|
2020-03-01 02:57:01 +00:00
|
|
|
Arch: runtime.GOARCH,
|
|
|
|
Os: runtime.GOOS,
|
2023-09-06 02:18:02 +00:00
|
|
|
PoolCount: svr.cfg.Transport.PoolCount,
|
2020-03-01 02:57:01 +00:00
|
|
|
User: svr.cfg.User,
|
|
|
|
Version: version.Full(),
|
|
|
|
Timestamp: time.Now().Unix(),
|
2020-05-24 09:48:37 +00:00
|
|
|
RunID: svr.runID,
|
2023-09-06 02:18:02 +00:00
|
|
|
Metas: svr.cfg.Metadatas,
|
2020-03-01 02:57:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Add auth
|
|
|
|
if err = svr.authSetter.SetLogin(loginMsg); err != nil {
|
|
|
|
return
|
2018-11-06 10:35:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if err = msg.WriteMsg(conn, loginMsg); err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var loginRespMsg msg.LoginResp
|
2022-08-28 17:02:53 +00:00
|
|
|
_ = conn.SetReadDeadline(time.Now().Add(10 * time.Second))
|
2018-11-06 10:35:05 +00:00
|
|
|
if err = msg.ReadMsgInto(conn, &loginRespMsg); err != nil {
|
|
|
|
return
|
|
|
|
}
|
2022-08-28 17:02:53 +00:00
|
|
|
_ = conn.SetReadDeadline(time.Time{})
|
2018-11-06 10:35:05 +00:00
|
|
|
|
|
|
|
if loginRespMsg.Error != "" {
|
|
|
|
err = fmt.Errorf("%s", loginRespMsg.Error)
|
2019-10-12 12:13:12 +00:00
|
|
|
xl.Error("%s", loginRespMsg.Error)
|
2018-11-06 10:35:05 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-05-24 09:48:37 +00:00
|
|
|
svr.runID = loginRespMsg.RunID
|
2019-10-12 12:13:12 +00:00
|
|
|
xl.ResetPrefixes()
|
2020-05-24 09:48:37 +00:00
|
|
|
xl.AppendPrefix(svr.runID)
|
2019-10-12 12:13:12 +00:00
|
|
|
|
2023-05-28 08:50:43 +00:00
|
|
|
xl.Info("login to server success, get run id [%s]", loginRespMsg.RunID)
|
2018-11-06 10:35:05 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-11-06 02:51:48 +00:00
|
|
|
func (svr *Service) loopLoginUntilSuccess(maxInterval time.Duration, firstLoginExit bool) {
|
|
|
|
xl := xlog.FromContextSafe(svr.ctx)
|
|
|
|
successCh := make(chan struct{})
|
|
|
|
|
|
|
|
loginFunc := func() error {
|
|
|
|
xl.Info("try to connect to server...")
|
|
|
|
conn, cm, err := svr.login()
|
|
|
|
if err != nil {
|
|
|
|
xl.Warn("connect to server error: %v", err)
|
|
|
|
if firstLoginExit {
|
|
|
|
svr.cancel()
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
ctl, err := NewControl(svr.ctx, svr.runID, conn, cm,
|
|
|
|
svr.cfg, svr.pxyCfgs, svr.visitorCfgs, svr.authSetter)
|
|
|
|
if err != nil {
|
|
|
|
conn.Close()
|
|
|
|
xl.Error("NewControl error: %v", err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
ctl.Run()
|
|
|
|
// close and replace previous control
|
|
|
|
svr.ctlMu.Lock()
|
|
|
|
if svr.ctl != nil {
|
|
|
|
svr.ctl.Close()
|
|
|
|
}
|
|
|
|
svr.ctl = ctl
|
|
|
|
svr.ctlMu.Unlock()
|
|
|
|
|
|
|
|
close(successCh)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// try to reconnect to server until success
|
|
|
|
wait.BackoffUntil(loginFunc, wait.NewFastBackoffManager(
|
|
|
|
wait.FastBackoffOptions{
|
|
|
|
Duration: time.Second,
|
|
|
|
Factor: 2,
|
|
|
|
Jitter: 0.1,
|
|
|
|
MaxDuration: maxInterval,
|
|
|
|
}),
|
|
|
|
true,
|
|
|
|
wait.MergeAndCloseOnAnyStopChannel(svr.ctx.Done(), successCh))
|
|
|
|
}
|
|
|
|
|
2023-09-06 02:18:02 +00:00
|
|
|
func (svr *Service) ReloadConf(pxyCfgs []v1.ProxyConfigurer, visitorCfgs []v1.VisitorConfigurer) error {
|
2018-11-06 10:35:05 +00:00
|
|
|
svr.cfgMu.Lock()
|
|
|
|
svr.pxyCfgs = pxyCfgs
|
|
|
|
svr.visitorCfgs = visitorCfgs
|
|
|
|
svr.cfgMu.Unlock()
|
|
|
|
|
2022-04-14 03:14:19 +00:00
|
|
|
svr.ctlMu.RLock()
|
2022-04-14 03:24:36 +00:00
|
|
|
ctl := svr.ctl
|
|
|
|
svr.ctlMu.RUnlock()
|
|
|
|
|
|
|
|
if ctl != nil {
|
|
|
|
return svr.ctl.ReloadConf(pxyCfgs, visitorCfgs)
|
|
|
|
}
|
|
|
|
return nil
|
2018-11-06 10:35:05 +00:00
|
|
|
}
|
|
|
|
|
2021-10-19 07:02:45 +00:00
|
|
|
func (svr *Service) Close() {
|
|
|
|
svr.GracefulClose(time.Duration(0))
|
|
|
|
}
|
|
|
|
|
|
|
|
func (svr *Service) GracefulClose(d time.Duration) {
|
2023-11-06 02:51:48 +00:00
|
|
|
svr.gracefulDuration = d
|
|
|
|
svr.cancel()
|
|
|
|
}
|
2022-04-14 03:14:19 +00:00
|
|
|
|
2023-11-06 02:51:48 +00:00
|
|
|
func (svr *Service) stop() {
|
|
|
|
svr.ctlMu.Lock()
|
|
|
|
defer svr.ctlMu.Unlock()
|
2020-09-07 07:45:44 +00:00
|
|
|
if svr.ctl != nil {
|
2023-11-06 02:51:48 +00:00
|
|
|
svr.ctl.GracefulClose(svr.gracefulDuration)
|
2023-06-29 10:04:20 +00:00
|
|
|
svr.ctl = nil
|
2020-09-07 07:45:44 +00:00
|
|
|
}
|
2017-06-26 17:59:30 +00:00
|
|
|
}
|
2022-12-12 03:04:10 +00:00
|
|
|
|
2023-11-06 02:51:48 +00:00
|
|
|
// ConnectionManager is a wrapper for establishing connections to the server.
|
2022-12-12 03:04:10 +00:00
|
|
|
type ConnectionManager struct {
|
|
|
|
ctx context.Context
|
2023-09-06 02:18:02 +00:00
|
|
|
cfg *v1.ClientCommonConfig
|
2022-12-12 03:04:10 +00:00
|
|
|
|
|
|
|
muxSession *fmux.Session
|
|
|
|
quicConn quic.Connection
|
|
|
|
}
|
|
|
|
|
2023-09-06 02:18:02 +00:00
|
|
|
func NewConnectionManager(ctx context.Context, cfg *v1.ClientCommonConfig) *ConnectionManager {
|
2022-12-12 03:04:10 +00:00
|
|
|
return &ConnectionManager{
|
|
|
|
ctx: ctx,
|
|
|
|
cfg: cfg,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-11-06 02:51:48 +00:00
|
|
|
// OpenConnection opens a underlying connection to the server.
|
|
|
|
// The underlying connection is either a TCP connection or a QUIC connection.
|
|
|
|
// After the underlying connection is established, you can call Connect() to get a stream.
|
|
|
|
// If TCPMux isn't enabled, the underlying connection is nil, you will get a new real TCP connection every time you call Connect().
|
2022-12-12 03:04:10 +00:00
|
|
|
func (cm *ConnectionManager) OpenConnection() error {
|
|
|
|
xl := xlog.FromContextSafe(cm.ctx)
|
|
|
|
|
|
|
|
// special for quic
|
2023-09-06 02:18:02 +00:00
|
|
|
if strings.EqualFold(cm.cfg.Transport.Protocol, "quic") {
|
2022-12-12 03:04:10 +00:00
|
|
|
var tlsConfig *tls.Config
|
|
|
|
var err error
|
2023-09-06 02:18:02 +00:00
|
|
|
sn := cm.cfg.Transport.TLS.ServerName
|
2022-12-12 03:04:10 +00:00
|
|
|
if sn == "" {
|
|
|
|
sn = cm.cfg.ServerAddr
|
|
|
|
}
|
2023-09-06 02:18:02 +00:00
|
|
|
if lo.FromPtr(cm.cfg.Transport.TLS.Enable) {
|
2022-12-12 03:04:10 +00:00
|
|
|
tlsConfig, err = transport.NewClientTLSConfig(
|
2023-09-06 02:18:02 +00:00
|
|
|
cm.cfg.Transport.TLS.CertFile,
|
|
|
|
cm.cfg.Transport.TLS.KeyFile,
|
|
|
|
cm.cfg.Transport.TLS.TrustedCaFile,
|
2022-12-12 03:04:10 +00:00
|
|
|
sn)
|
|
|
|
} else {
|
|
|
|
tlsConfig, err = transport.NewClientTLSConfig("", "", "", sn)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
xl.Warn("fail to build tls configuration, err: %v", err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
tlsConfig.NextProtos = []string{"frp"}
|
|
|
|
|
2023-07-21 06:34:44 +00:00
|
|
|
conn, err := quic.DialAddr(
|
2023-05-30 02:55:00 +00:00
|
|
|
cm.ctx,
|
2022-12-12 03:04:10 +00:00
|
|
|
net.JoinHostPort(cm.cfg.ServerAddr, strconv.Itoa(cm.cfg.ServerPort)),
|
2022-12-18 10:43:42 +00:00
|
|
|
tlsConfig, &quic.Config{
|
2023-09-06 02:18:02 +00:00
|
|
|
MaxIdleTimeout: time.Duration(cm.cfg.Transport.QUIC.MaxIdleTimeout) * time.Second,
|
|
|
|
MaxIncomingStreams: int64(cm.cfg.Transport.QUIC.MaxIncomingStreams),
|
|
|
|
KeepAlivePeriod: time.Duration(cm.cfg.Transport.QUIC.KeepalivePeriod) * time.Second,
|
2022-12-18 10:43:42 +00:00
|
|
|
})
|
2022-12-12 03:04:10 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
cm.quicConn = conn
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-09-06 02:18:02 +00:00
|
|
|
if !lo.FromPtr(cm.cfg.Transport.TCPMux) {
|
2022-12-12 03:04:10 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
conn, err := cm.realConnect()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
fmuxCfg := fmux.DefaultConfig()
|
2023-09-06 02:18:02 +00:00
|
|
|
fmuxCfg.KeepAliveInterval = time.Duration(cm.cfg.Transport.TCPMuxKeepaliveInterval) * time.Second
|
2022-12-12 03:04:10 +00:00
|
|
|
fmuxCfg.LogOutput = io.Discard
|
2023-06-04 11:58:55 +00:00
|
|
|
fmuxCfg.MaxStreamWindowSize = 6 * 1024 * 1024
|
2022-12-12 03:04:10 +00:00
|
|
|
session, err := fmux.Client(conn, fmuxCfg)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
cm.muxSession = session
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-11-06 02:51:48 +00:00
|
|
|
// Connect returns a stream from the underlying connection, or a new TCP connection if TCPMux isn't enabled.
|
2022-12-12 03:04:10 +00:00
|
|
|
func (cm *ConnectionManager) Connect() (net.Conn, error) {
|
|
|
|
if cm.quicConn != nil {
|
|
|
|
stream, err := cm.quicConn.OpenStreamSync(context.Background())
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2023-05-29 06:10:34 +00:00
|
|
|
return utilnet.QuicStreamToNetConn(stream, cm.quicConn), nil
|
2022-12-12 03:04:10 +00:00
|
|
|
} else if cm.muxSession != nil {
|
|
|
|
stream, err := cm.muxSession.OpenStream()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return stream, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return cm.realConnect()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cm *ConnectionManager) realConnect() (net.Conn, error) {
|
|
|
|
xl := xlog.FromContextSafe(cm.ctx)
|
|
|
|
var tlsConfig *tls.Config
|
|
|
|
var err error
|
2023-09-06 02:18:02 +00:00
|
|
|
tlsEnable := lo.FromPtr(cm.cfg.Transport.TLS.Enable)
|
|
|
|
if cm.cfg.Transport.Protocol == "wss" {
|
2023-06-29 03:20:45 +00:00
|
|
|
tlsEnable = true
|
|
|
|
}
|
|
|
|
if tlsEnable {
|
2023-09-06 02:18:02 +00:00
|
|
|
sn := cm.cfg.Transport.TLS.ServerName
|
2022-12-12 03:04:10 +00:00
|
|
|
if sn == "" {
|
|
|
|
sn = cm.cfg.ServerAddr
|
|
|
|
}
|
|
|
|
|
|
|
|
tlsConfig, err = transport.NewClientTLSConfig(
|
2023-09-06 02:18:02 +00:00
|
|
|
cm.cfg.Transport.TLS.CertFile,
|
|
|
|
cm.cfg.Transport.TLS.KeyFile,
|
|
|
|
cm.cfg.Transport.TLS.TrustedCaFile,
|
2022-12-12 03:04:10 +00:00
|
|
|
sn)
|
|
|
|
if err != nil {
|
|
|
|
xl.Warn("fail to build tls configuration, err: %v", err)
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-09-06 02:18:02 +00:00
|
|
|
proxyType, addr, auth, err := libdial.ParseProxyURL(cm.cfg.Transport.ProxyURL)
|
2022-12-12 03:04:10 +00:00
|
|
|
if err != nil {
|
|
|
|
xl.Error("fail to parse proxy url")
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
dialOptions := []libdial.DialOption{}
|
2023-09-06 02:18:02 +00:00
|
|
|
protocol := cm.cfg.Transport.Protocol
|
2023-06-29 03:20:45 +00:00
|
|
|
switch protocol {
|
|
|
|
case "websocket":
|
|
|
|
protocol = "tcp"
|
|
|
|
dialOptions = append(dialOptions, libdial.WithAfterHook(libdial.AfterHook{Hook: utilnet.DialHookWebsocket(protocol, "")}))
|
|
|
|
dialOptions = append(dialOptions, libdial.WithAfterHook(libdial.AfterHook{
|
2023-09-06 02:18:02 +00:00
|
|
|
Hook: utilnet.DialHookCustomTLSHeadByte(tlsConfig != nil, lo.FromPtr(cm.cfg.Transport.TLS.DisableCustomTLSFirstByte)),
|
2023-06-29 03:20:45 +00:00
|
|
|
}))
|
|
|
|
dialOptions = append(dialOptions, libdial.WithTLSConfig(tlsConfig))
|
|
|
|
case "wss":
|
2022-12-12 03:04:10 +00:00
|
|
|
protocol = "tcp"
|
2023-06-29 03:20:45 +00:00
|
|
|
dialOptions = append(dialOptions, libdial.WithTLSConfigAndPriority(100, tlsConfig))
|
|
|
|
// Make sure that if it is wss, the websocket hook is executed after the tls hook.
|
|
|
|
dialOptions = append(dialOptions, libdial.WithAfterHook(libdial.AfterHook{Hook: utilnet.DialHookWebsocket(protocol, tlsConfig.ServerName), Priority: 110}))
|
|
|
|
default:
|
2023-10-11 03:49:40 +00:00
|
|
|
dialOptions = append(dialOptions, libdial.WithAfterHook(libdial.AfterHook{
|
|
|
|
Hook: utilnet.DialHookCustomTLSHeadByte(tlsConfig != nil, lo.FromPtr(cm.cfg.Transport.TLS.DisableCustomTLSFirstByte)),
|
|
|
|
}))
|
2023-06-29 03:20:45 +00:00
|
|
|
dialOptions = append(dialOptions, libdial.WithTLSConfig(tlsConfig))
|
2022-12-12 03:04:10 +00:00
|
|
|
}
|
2023-06-29 03:20:45 +00:00
|
|
|
|
2023-09-06 02:18:02 +00:00
|
|
|
if cm.cfg.Transport.ConnectServerLocalIP != "" {
|
|
|
|
dialOptions = append(dialOptions, libdial.WithLocalAddr(cm.cfg.Transport.ConnectServerLocalIP))
|
2022-12-12 03:04:10 +00:00
|
|
|
}
|
|
|
|
dialOptions = append(dialOptions,
|
|
|
|
libdial.WithProtocol(protocol),
|
2023-09-06 02:18:02 +00:00
|
|
|
libdial.WithTimeout(time.Duration(cm.cfg.Transport.DialServerTimeout)*time.Second),
|
|
|
|
libdial.WithKeepAlive(time.Duration(cm.cfg.Transport.DialServerKeepAlive)*time.Second),
|
2022-12-12 03:04:10 +00:00
|
|
|
libdial.WithProxy(proxyType, addr),
|
|
|
|
libdial.WithProxyAuth(auth),
|
|
|
|
)
|
2023-05-30 02:55:00 +00:00
|
|
|
conn, err := libdial.DialContext(
|
|
|
|
cm.ctx,
|
2022-12-12 03:04:10 +00:00
|
|
|
net.JoinHostPort(cm.cfg.ServerAddr, strconv.Itoa(cm.cfg.ServerPort)),
|
|
|
|
dialOptions...,
|
|
|
|
)
|
|
|
|
return conn, err
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cm *ConnectionManager) Close() error {
|
|
|
|
if cm.quicConn != nil {
|
|
|
|
_ = cm.quicConn.CloseWithError(0, "")
|
|
|
|
}
|
|
|
|
if cm.muxSession != nil {
|
|
|
|
_ = cm.muxSession.Close()
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|