1
0

bridge.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481
  1. package bridge
  2. import (
  3. "encoding/binary"
  4. "errors"
  5. "fmt"
  6. "github.com/cnlh/nps/lib/common"
  7. "github.com/cnlh/nps/lib/conn"
  8. "github.com/cnlh/nps/lib/crypt"
  9. "github.com/cnlh/nps/lib/file"
  10. "github.com/cnlh/nps/lib/mux"
  11. "github.com/cnlh/nps/lib/version"
  12. "github.com/cnlh/nps/server/tool"
  13. "github.com/cnlh/nps/vender/github.com/astaxie/beego"
  14. "github.com/cnlh/nps/vender/github.com/astaxie/beego/logs"
  15. "github.com/cnlh/nps/vender/github.com/xtaci/kcp"
  16. "net"
  17. "strconv"
  18. "sync"
  19. "time"
  20. )
  21. type Client struct {
  22. tunnel *mux.Mux
  23. signal *conn.Conn
  24. file *mux.Mux
  25. retryTime int // it will be add 1 when ping not ok until to 3 will close the client
  26. sync.RWMutex
  27. }
  28. func NewClient(t, f *mux.Mux, s *conn.Conn) *Client {
  29. return &Client{
  30. signal: s,
  31. tunnel: t,
  32. file: f,
  33. }
  34. }
  35. type Bridge struct {
  36. TunnelPort int //通信隧道端口
  37. tcpListener *net.TCPListener //server端监听
  38. kcpListener *kcp.Listener //server端监听
  39. Client map[int]*Client
  40. tunnelType string //bridge type kcp or tcp
  41. OpenTask chan *file.Tunnel
  42. CloseClient chan int
  43. SecretChan chan *conn.Secret
  44. clientLock sync.RWMutex
  45. Register map[string]time.Time
  46. registerLock sync.RWMutex
  47. ipVerify bool
  48. runList map[int]interface{}
  49. }
  50. func NewTunnel(tunnelPort int, tunnelType string, ipVerify bool, runList map[int]interface{}) *Bridge {
  51. t := new(Bridge)
  52. t.TunnelPort = tunnelPort
  53. t.Client = make(map[int]*Client)
  54. t.tunnelType = tunnelType
  55. t.OpenTask = make(chan *file.Tunnel)
  56. t.CloseClient = make(chan int)
  57. t.Register = make(map[string]time.Time)
  58. t.ipVerify = ipVerify
  59. t.runList = runList
  60. t.SecretChan = make(chan *conn.Secret)
  61. return t
  62. }
  63. func (s *Bridge) StartTunnel() error {
  64. go s.ping()
  65. var err error
  66. if s.tunnelType == "kcp" {
  67. s.kcpListener, err = kcp.ListenWithOptions(":"+strconv.Itoa(s.TunnelPort), nil, 150, 3)
  68. if err != nil {
  69. return err
  70. }
  71. go func() {
  72. for {
  73. c, err := s.kcpListener.AcceptKCP()
  74. conn.SetUdpSession(c)
  75. if err != nil {
  76. logs.Warn(err)
  77. continue
  78. }
  79. go s.cliProcess(conn.NewConn(c))
  80. }
  81. }()
  82. } else {
  83. s.tcpListener, err = net.ListenTCP("tcp", &net.TCPAddr{net.ParseIP("0.0.0.0"), s.TunnelPort, ""})
  84. if err != nil {
  85. return err
  86. }
  87. go func() {
  88. for {
  89. c, err := s.tcpListener.Accept()
  90. if err != nil {
  91. logs.Warn(err)
  92. continue
  93. }
  94. go s.cliProcess(conn.NewConn(c))
  95. }
  96. }()
  97. }
  98. return nil
  99. }
  100. //验证失败,返回错误验证flag,并且关闭连接
  101. func (s *Bridge) verifyError(c *conn.Conn) {
  102. c.Write([]byte(common.VERIFY_EER))
  103. c.Conn.Close()
  104. }
  105. func (s *Bridge) verifySuccess(c *conn.Conn) {
  106. c.Write([]byte(common.VERIFY_SUCCESS))
  107. }
  108. func (s *Bridge) cliProcess(c *conn.Conn) {
  109. //version check
  110. if b, err := c.GetShortContent(32); err != nil || string(b) != crypt.Md5(version.GetVersion()) {
  111. logs.Info("The client %s version does not match", c.Conn.RemoteAddr())
  112. c.Close()
  113. return
  114. }
  115. //write server version to client
  116. c.Write([]byte(crypt.Md5(version.GetVersion())))
  117. c.SetReadDeadline(5, s.tunnelType)
  118. var buf []byte
  119. var err error
  120. //get vkey from client
  121. if buf, err = c.GetShortContent(32); err != nil {
  122. c.Close()
  123. return
  124. }
  125. //verify
  126. id, err := file.GetCsvDb().GetIdByVerifyKey(string(buf), c.Conn.RemoteAddr().String())
  127. if err != nil {
  128. logs.Info("Current client connection validation error, close this client:", c.Conn.RemoteAddr())
  129. s.verifyError(c)
  130. return
  131. } else {
  132. s.verifySuccess(c)
  133. }
  134. //做一个判断 添加到对应的channel里面以供使用
  135. if flag, err := c.ReadFlag(); err == nil {
  136. s.typeDeal(flag, c, id)
  137. } else {
  138. logs.Warn(err, flag)
  139. }
  140. return
  141. }
  142. func (s *Bridge) DelClient(id int, isOther bool) {
  143. s.clientLock.Lock()
  144. defer s.clientLock.Unlock()
  145. if v, ok := s.Client[id]; ok {
  146. if c, err := file.GetCsvDb().GetClient(id); err == nil && c.NoStore {
  147. s.CloseClient <- c.Id
  148. }
  149. if v.signal != nil {
  150. v.signal.Close()
  151. }
  152. delete(s.Client, id)
  153. }
  154. }
  155. //use different
  156. func (s *Bridge) typeDeal(typeVal string, c *conn.Conn, id int) {
  157. switch typeVal {
  158. case common.WORK_MAIN:
  159. //the vKey connect by another ,close the client of before
  160. s.clientLock.Lock()
  161. if v, ok := s.Client[id]; ok {
  162. s.clientLock.Unlock()
  163. if v.signal != nil {
  164. v.signal.WriteClose()
  165. }
  166. v.Lock()
  167. v.signal = c
  168. v.Unlock()
  169. } else {
  170. s.Client[id] = NewClient(nil, nil, c)
  171. s.clientLock.Unlock()
  172. }
  173. logs.Info("clientId %d connection succeeded, address:%s ", id, c.Conn.RemoteAddr())
  174. case common.WORK_CHAN:
  175. s.clientLock.Lock()
  176. if v, ok := s.Client[id]; ok {
  177. s.clientLock.Unlock()
  178. v.Lock()
  179. v.tunnel = mux.NewMux(c.Conn)
  180. v.Unlock()
  181. } else {
  182. s.Client[id] = NewClient(mux.NewMux(c.Conn), nil, nil)
  183. s.clientLock.Unlock()
  184. }
  185. case common.WORK_CONFIG:
  186. var isPub bool
  187. client, err := file.GetCsvDb().GetClient(id);
  188. if err == nil {
  189. if client.VerifyKey == beego.AppConfig.String("publicVkey") {
  190. isPub = true
  191. } else {
  192. isPub = false
  193. }
  194. }
  195. binary.Write(c, binary.LittleEndian, isPub)
  196. go s.getConfig(c, isPub, client)
  197. case common.WORK_REGISTER:
  198. go s.register(c)
  199. case common.WORK_SECRET:
  200. if b, err := c.GetShortContent(32); err == nil {
  201. s.SecretChan <- conn.NewSecret(string(b), c)
  202. }
  203. case common.WORK_FILE:
  204. s.clientLock.Lock()
  205. if v, ok := s.Client[id]; ok {
  206. s.clientLock.Unlock()
  207. v.Lock()
  208. v.file = mux.NewMux(c.Conn)
  209. v.Unlock()
  210. } else {
  211. s.Client[id] = NewClient(nil, mux.NewMux(c.Conn), nil)
  212. s.clientLock.Unlock()
  213. }
  214. case common.WORK_P2P:
  215. //read md5 secret
  216. if b, err := c.GetShortContent(32); err != nil {
  217. return
  218. } else if t := file.GetCsvDb().GetTaskByMd5Password(string(b)); t == nil {
  219. return
  220. } else {
  221. s.clientLock.Lock()
  222. if v, ok := s.Client[t.Client.Id]; !ok {
  223. s.clientLock.Unlock()
  224. return
  225. } else {
  226. s.clientLock.Unlock()
  227. //向密钥对应的客户端发送与服务端udp建立连接信息,地址,密钥
  228. v.signal.Write([]byte(common.NEW_UDP_CONN))
  229. svrAddr := beego.AppConfig.String("serverIp") + ":" + beego.AppConfig.String("p2pPort")
  230. if err != nil {
  231. logs.Warn("get local udp addr error")
  232. return
  233. }
  234. v.signal.WriteLenContent([]byte(svrAddr))
  235. v.signal.WriteLenContent(b)
  236. //向该请求者发送建立连接请求,服务器地址
  237. c.WriteLenContent([]byte(svrAddr))
  238. }
  239. }
  240. }
  241. c.SetAlive(s.tunnelType)
  242. return
  243. }
  244. //register ip
  245. func (s *Bridge) register(c *conn.Conn) {
  246. var hour int32
  247. if err := binary.Read(c, binary.LittleEndian, &hour); err == nil {
  248. s.registerLock.Lock()
  249. s.Register[common.GetIpByAddr(c.Conn.RemoteAddr().String())] = time.Now().Add(time.Hour * time.Duration(hour))
  250. s.registerLock.Unlock()
  251. }
  252. }
  253. func (s *Bridge) SendLinkInfo(clientId int, link *conn.Link, linkAddr string, t *file.Tunnel) (target net.Conn, err error) {
  254. s.clientLock.Lock()
  255. if v, ok := s.Client[clientId]; ok {
  256. s.clientLock.Unlock()
  257. //If ip is restricted to do ip verification
  258. if s.ipVerify {
  259. s.registerLock.Lock()
  260. ip := common.GetIpByAddr(linkAddr)
  261. if v, ok := s.Register[ip]; !ok {
  262. s.registerLock.Unlock()
  263. return nil, errors.New(fmt.Sprintf("The ip %s is not in the validation list", ip))
  264. } else {
  265. if !v.After(time.Now()) {
  266. return nil, errors.New(fmt.Sprintf("The validity of the ip %s has expired", ip))
  267. }
  268. }
  269. s.registerLock.Unlock()
  270. }
  271. var tunnel *mux.Mux
  272. if t != nil && t.Mode == "file" {
  273. tunnel = v.file
  274. } else {
  275. tunnel = v.tunnel
  276. }
  277. if tunnel == nil {
  278. err = errors.New("the client connect error")
  279. return
  280. }
  281. if target, err = tunnel.NewConn(); err != nil {
  282. return
  283. }
  284. if t != nil && t.Mode == "file" {
  285. return
  286. }
  287. if _, err = conn.NewConn(target).SendLinkInfo(link); err != nil {
  288. logs.Info("new connect error ,the target %s refuse to connect", link.Host)
  289. return
  290. }
  291. } else {
  292. s.clientLock.Unlock()
  293. err = errors.New(fmt.Sprintf("the client %d is not connect", clientId))
  294. }
  295. return
  296. }
  297. func (s *Bridge) ping() {
  298. ticker := time.NewTicker(time.Second * 5)
  299. for {
  300. select {
  301. case <-ticker.C:
  302. s.clientLock.Lock()
  303. arr := make([]int, 0)
  304. for k, v := range s.Client {
  305. if v.tunnel == nil {
  306. v.retryTime += 1
  307. if v.retryTime >= 3 {
  308. arr = append(arr, k)
  309. }
  310. continue
  311. }
  312. if v.tunnel.IsClose {
  313. arr = append(arr, k)
  314. }
  315. }
  316. s.clientLock.Unlock()
  317. for _, v := range arr {
  318. logs.Info("the client %d closed", v)
  319. s.DelClient(v, false)
  320. }
  321. }
  322. }
  323. }
  324. //get config and add task from client config
  325. func (s *Bridge) getConfig(c *conn.Conn, isPub bool, client *file.Client) {
  326. var fail bool
  327. for {
  328. flag, err := c.ReadFlag()
  329. if err != nil {
  330. break
  331. }
  332. switch flag {
  333. case common.WORK_STATUS:
  334. if b, err := c.GetShortContent(32); err != nil {
  335. break
  336. } else {
  337. var str string
  338. id, err := file.GetCsvDb().GetClientIdByVkey(string(b))
  339. if err != nil {
  340. break
  341. }
  342. for _, v := range file.GetCsvDb().Hosts {
  343. if v.Client.Id == id {
  344. str += v.Remark + common.CONN_DATA_SEQ
  345. }
  346. }
  347. for _, v := range file.GetCsvDb().Tasks {
  348. if _, ok := s.runList[v.Id]; ok && v.Client.Id == id {
  349. str += v.Remark + common.CONN_DATA_SEQ
  350. }
  351. }
  352. binary.Write(c, binary.LittleEndian, int32(len([]byte(str))))
  353. binary.Write(c, binary.LittleEndian, []byte(str))
  354. }
  355. case common.NEW_CONF:
  356. var err error
  357. if client, err = c.GetConfigInfo(); err != nil {
  358. fail = true
  359. c.WriteAddFail()
  360. break
  361. } else {
  362. if err = file.GetCsvDb().NewClient(client); err != nil {
  363. fail = true
  364. c.WriteAddFail()
  365. break
  366. }
  367. c.WriteAddOk()
  368. c.Write([]byte(client.VerifyKey))
  369. }
  370. case common.NEW_HOST:
  371. h, err := c.GetHostInfo()
  372. if err != nil {
  373. fail = true
  374. c.WriteAddFail()
  375. break
  376. }
  377. h.Client = client
  378. if h.Location == "" {
  379. h.Location = "/"
  380. }
  381. if !client.HasHost(h) {
  382. if file.GetCsvDb().IsHostExist(h) {
  383. fail = true
  384. c.WriteAddFail()
  385. break
  386. } else {
  387. file.GetCsvDb().NewHost(h)
  388. c.WriteAddOk()
  389. }
  390. } else {
  391. c.WriteAddOk()
  392. }
  393. case common.NEW_TASK:
  394. if t, err := c.GetTaskInfo(); err != nil {
  395. fail = true
  396. c.WriteAddFail()
  397. break
  398. } else {
  399. ports := common.GetPorts(t.Ports)
  400. targets := common.GetPorts(t.Target)
  401. if len(ports) > 1 && (t.Mode == "tcp" || t.Mode == "udp") && (len(ports) != len(targets)) {
  402. fail = true
  403. c.WriteAddFail()
  404. break
  405. } else if t.Mode == "secret" {
  406. ports = append(ports, 0)
  407. }
  408. if len(ports) == 0 {
  409. fail = true
  410. c.WriteAddFail()
  411. break
  412. }
  413. for i := 0; i < len(ports); i++ {
  414. tl := new(file.Tunnel)
  415. tl.Mode = t.Mode
  416. tl.Port = ports[i]
  417. if len(ports) == 1 {
  418. tl.Target = t.Target
  419. tl.Remark = t.Remark
  420. } else {
  421. tl.Remark = t.Remark + "_" + strconv.Itoa(tl.Port)
  422. if t.TargetAddr != "" {
  423. tl.Target = t.TargetAddr + ":" + strconv.Itoa(targets[i])
  424. } else {
  425. tl.Target = strconv.Itoa(targets[i])
  426. }
  427. }
  428. tl.Id = file.GetCsvDb().GetTaskId()
  429. tl.Status = true
  430. tl.Flow = new(file.Flow)
  431. tl.NoStore = true
  432. tl.Client = client
  433. tl.Password = t.Password
  434. tl.LocalPath = t.LocalPath
  435. tl.StripPre = t.StripPre
  436. if !client.HasTunnel(tl) {
  437. if err := file.GetCsvDb().NewTask(tl); err != nil {
  438. logs.Notice("Add task error ", err.Error())
  439. fail = true
  440. c.WriteAddFail()
  441. break
  442. }
  443. if b := tool.TestServerPort(tl.Port, tl.Mode); !b && t.Mode != "secret" && t.Mode != "p2p" {
  444. fail = true
  445. c.WriteAddFail()
  446. break
  447. } else {
  448. s.OpenTask <- tl
  449. }
  450. }
  451. c.WriteAddOk()
  452. }
  453. }
  454. }
  455. }
  456. if fail && client != nil {
  457. s.DelClient(client.Id, false)
  458. }
  459. c.Close()
  460. }