mirror of https://github.com/fatedier/frp
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
225 lines
5.1 KiB
225 lines
5.1 KiB
// Copyright 2018 fatedier, fatedier@gmail.com
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package group
|
|
|
|
import (
|
|
"fmt"
|
|
"net"
|
|
"sync"
|
|
|
|
"github.com/fatedier/frp/server/ports"
|
|
|
|
gerr "github.com/fatedier/golib/errors"
|
|
)
|
|
|
|
// TCPGroupCtl manage all TCPGroups
|
|
type TCPGroupCtl struct {
|
|
groups map[string]*TCPGroup
|
|
|
|
// portManager is used to manage port
|
|
portManager *ports.Manager
|
|
mu sync.Mutex
|
|
}
|
|
|
|
// NewTCPGroupCtl return a new TcpGroupCtl
|
|
func NewTCPGroupCtl(portManager *ports.Manager) *TCPGroupCtl {
|
|
return &TCPGroupCtl{
|
|
groups: make(map[string]*TCPGroup),
|
|
portManager: portManager,
|
|
}
|
|
}
|
|
|
|
// Listen is the wrapper for TCPGroup's Listen
|
|
// If there are no group, we will create one here
|
|
func (tgc *TCPGroupCtl) Listen(proxyName string, group string, groupKey string,
|
|
addr string, port int) (l net.Listener, realPort int, err error) {
|
|
|
|
tgc.mu.Lock()
|
|
tcpGroup, ok := tgc.groups[group]
|
|
if !ok {
|
|
tcpGroup = NewTCPGroup(tgc)
|
|
tgc.groups[group] = tcpGroup
|
|
}
|
|
tgc.mu.Unlock()
|
|
|
|
return tcpGroup.Listen(proxyName, group, groupKey, addr, port)
|
|
}
|
|
|
|
// RemoveGroup remove TCPGroup from controller
|
|
func (tgc *TCPGroupCtl) RemoveGroup(group string) {
|
|
tgc.mu.Lock()
|
|
defer tgc.mu.Unlock()
|
|
delete(tgc.groups, group)
|
|
}
|
|
|
|
// TCPGroup route connections to different proxies
|
|
type TCPGroup struct {
|
|
group string
|
|
groupKey string
|
|
addr string
|
|
port int
|
|
realPort int
|
|
|
|
acceptCh chan net.Conn
|
|
index uint64
|
|
tcpLn net.Listener
|
|
lns []*TCPGroupListener
|
|
ctl *TCPGroupCtl
|
|
mu sync.Mutex
|
|
}
|
|
|
|
// NewTCPGroup return a new TCPGroup
|
|
func NewTCPGroup(ctl *TCPGroupCtl) *TCPGroup {
|
|
return &TCPGroup{
|
|
lns: make([]*TCPGroupListener, 0),
|
|
ctl: ctl,
|
|
acceptCh: make(chan net.Conn),
|
|
}
|
|
}
|
|
|
|
// Listen will return a new TCPGroupListener
|
|
// if TCPGroup already has a listener, just add a new TCPGroupListener to the queues
|
|
// otherwise, listen on the real address
|
|
func (tg *TCPGroup) Listen(proxyName string, group string, groupKey string, addr string, port int) (ln *TCPGroupListener, realPort int, err error) {
|
|
tg.mu.Lock()
|
|
defer tg.mu.Unlock()
|
|
if len(tg.lns) == 0 {
|
|
// the first listener, listen on the real address
|
|
realPort, err = tg.ctl.portManager.Acquire(proxyName, port)
|
|
if err != nil {
|
|
return
|
|
}
|
|
tcpLn, errRet := net.Listen("tcp", fmt.Sprintf("%s:%d", addr, port))
|
|
if errRet != nil {
|
|
err = errRet
|
|
return
|
|
}
|
|
ln = newTCPGroupListener(group, tg, tcpLn.Addr())
|
|
|
|
tg.group = group
|
|
tg.groupKey = groupKey
|
|
tg.addr = addr
|
|
tg.port = port
|
|
tg.realPort = realPort
|
|
tg.tcpLn = tcpLn
|
|
tg.lns = append(tg.lns, ln)
|
|
if tg.acceptCh == nil {
|
|
tg.acceptCh = make(chan net.Conn)
|
|
}
|
|
go tg.worker()
|
|
} else {
|
|
// address and port in the same group must be equal
|
|
if tg.group != group || tg.addr != addr {
|
|
err = ErrGroupParamsInvalid
|
|
return
|
|
}
|
|
if tg.port != port {
|
|
err = ErrGroupDifferentPort
|
|
return
|
|
}
|
|
if tg.groupKey != groupKey {
|
|
err = ErrGroupAuthFailed
|
|
return
|
|
}
|
|
ln = newTCPGroupListener(group, tg, tg.lns[0].Addr())
|
|
realPort = tg.realPort
|
|
tg.lns = append(tg.lns, ln)
|
|
}
|
|
return
|
|
}
|
|
|
|
// worker is called when the real tcp listener has been created
|
|
func (tg *TCPGroup) worker() {
|
|
for {
|
|
c, err := tg.tcpLn.Accept()
|
|
if err != nil {
|
|
return
|
|
}
|
|
err = gerr.PanicToError(func() {
|
|
tg.acceptCh <- c
|
|
})
|
|
if err != nil {
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
func (tg *TCPGroup) Accept() <-chan net.Conn {
|
|
return tg.acceptCh
|
|
}
|
|
|
|
// CloseListener remove the TCPGroupListener from the TCPGroup
|
|
func (tg *TCPGroup) CloseListener(ln *TCPGroupListener) {
|
|
tg.mu.Lock()
|
|
defer tg.mu.Unlock()
|
|
for i, tmpLn := range tg.lns {
|
|
if tmpLn == ln {
|
|
tg.lns = append(tg.lns[:i], tg.lns[i+1:]...)
|
|
break
|
|
}
|
|
}
|
|
if len(tg.lns) == 0 {
|
|
close(tg.acceptCh)
|
|
tg.tcpLn.Close()
|
|
tg.ctl.portManager.Release(tg.realPort)
|
|
tg.ctl.RemoveGroup(tg.group)
|
|
}
|
|
}
|
|
|
|
// TCPGroupListener
|
|
type TCPGroupListener struct {
|
|
groupName string
|
|
group *TCPGroup
|
|
|
|
addr net.Addr
|
|
closeCh chan struct{}
|
|
}
|
|
|
|
func newTCPGroupListener(name string, group *TCPGroup, addr net.Addr) *TCPGroupListener {
|
|
return &TCPGroupListener{
|
|
groupName: name,
|
|
group: group,
|
|
addr: addr,
|
|
closeCh: make(chan struct{}),
|
|
}
|
|
}
|
|
|
|
// Accept will accept connections from TCPGroup
|
|
func (ln *TCPGroupListener) Accept() (c net.Conn, err error) {
|
|
var ok bool
|
|
select {
|
|
case <-ln.closeCh:
|
|
return nil, ErrListenerClosed
|
|
case c, ok = <-ln.group.Accept():
|
|
if !ok {
|
|
return nil, ErrListenerClosed
|
|
}
|
|
return c, nil
|
|
}
|
|
}
|
|
|
|
func (ln *TCPGroupListener) Addr() net.Addr {
|
|
return ln.addr
|
|
}
|
|
|
|
// Close close the listener
|
|
func (ln *TCPGroupListener) Close() (err error) {
|
|
close(ln.closeCh)
|
|
|
|
// remove self from TcpGroup
|
|
ln.group.CloseListener(ln)
|
|
return
|
|
}
|