123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426 |
- package client
- import (
- "encoding/base64"
- "encoding/binary"
- "errors"
- "github.com/cnlh/nps/lib/common"
- "github.com/cnlh/nps/lib/config"
- "github.com/cnlh/nps/lib/conn"
- "github.com/cnlh/nps/lib/crypt"
- "github.com/cnlh/nps/lib/version"
- "github.com/cnlh/nps/vender/github.com/astaxie/beego/logs"
- "github.com/cnlh/nps/vender/github.com/ccding/go-stun/stun"
- "github.com/cnlh/nps/vender/github.com/xtaci/kcp"
- "github.com/cnlh/nps/vender/golang.org/x/net/proxy"
- "io/ioutil"
- "log"
- "net"
- "net/http"
- "net/http/httputil"
- "net/url"
- "os"
- "path/filepath"
- "strconv"
- "strings"
- "time"
- )
- func GetTaskStatus(path string) {
- cnf, err := config.NewConfig(path)
- if err != nil {
- log.Fatalln(err)
- }
- c, err := NewConn(cnf.CommonConfig.Tp, cnf.CommonConfig.VKey, cnf.CommonConfig.Server, common.WORK_CONFIG, cnf.CommonConfig.ProxyUrl)
- if err != nil {
- log.Fatalln(err)
- }
- if _, err := c.Write([]byte(common.WORK_STATUS)); err != nil {
- log.Fatalln(err)
- }
- //read now vKey and write to server
- if f, err := common.ReadAllFromFile(filepath.Join(common.GetTmpPath(), "npc_vkey.txt")); err != nil {
- log.Fatalln(err)
- } else if _, err := c.Write([]byte(crypt.Md5(string(f)))); err != nil {
- log.Fatalln(err)
- }
- var isPub bool
- binary.Read(c, binary.LittleEndian, &isPub)
- if l, err := c.GetLen(); err != nil {
- log.Fatalln(err)
- } else if b, err := c.GetShortContent(l); err != nil {
- log.Fatalln(err)
- } else {
- arr := strings.Split(string(b), common.CONN_DATA_SEQ)
- for _, v := range cnf.Hosts {
- if common.InStrArr(arr, v.Remark) {
- log.Println(v.Remark, "ok")
- } else {
- log.Println(v.Remark, "not running")
- }
- }
- for _, v := range cnf.Tasks {
- ports := common.GetPorts(v.Ports)
- if v.Mode == "secret" {
- ports = append(ports, 0)
- }
- for _, vv := range ports {
- var remark string
- if len(ports) > 1 {
- remark = v.Remark + "_" + strconv.Itoa(vv)
- } else {
- remark = v.Remark
- }
- if common.InStrArr(arr, remark) {
- log.Println(remark, "ok")
- } else {
- log.Println(remark, "not running")
- }
- }
- }
- }
- os.Exit(0)
- }
- var errAdd = errors.New("The server returned an error, which port or host may have been occupied or not allowed to open.")
- func StartFromFile(path string) {
- first := true
- cnf, err := config.NewConfig(path)
- if err != nil || cnf.CommonConfig == nil {
- logs.Error("Config file %s loading error %s", path, err.Error())
- os.Exit(0)
- }
- logs.Info("Loading configuration file %s successfully", path)
- re:
- if first || cnf.CommonConfig.AutoReconnection {
- if !first {
- logs.Info("Reconnecting...")
- time.Sleep(time.Second * 5)
- }
- } else {
- return
- }
- first = false
- c, err := NewConn(cnf.CommonConfig.Tp, cnf.CommonConfig.VKey, cnf.CommonConfig.Server, common.WORK_CONFIG, cnf.CommonConfig.ProxyUrl)
- if err != nil {
- logs.Error(err)
- goto re
- }
- var isPub bool
- binary.Read(c, binary.LittleEndian, &isPub)
- // get tmp password
- var b []byte
- vkey := cnf.CommonConfig.VKey
- if isPub {
- // send global configuration to server and get status of config setting
- if _, err := c.SendInfo(cnf.CommonConfig.Client, common.NEW_CONF); err != nil {
- logs.Error(err)
- goto re
- }
- if !c.GetAddStatus() {
- logs.Error("the web_user may have been occupied!")
- goto re
- }
- if b, err = c.GetShortContent(16); err != nil {
- logs.Error(err)
- goto re
- }
- vkey = string(b)
- }
- ioutil.WriteFile(filepath.Join(common.GetTmpPath(), "npc_vkey.txt"), []byte(vkey), 0600)
- //send hosts to server
- for _, v := range cnf.Hosts {
- if _, err := c.SendInfo(v, common.NEW_HOST); err != nil {
- logs.Error(err)
- goto re
- }
- if !c.GetAddStatus() {
- logs.Error(errAdd, v.Host)
- goto re
- }
- }
- //send task to server
- for _, v := range cnf.Tasks {
- if _, err := c.SendInfo(v, common.NEW_TASK); err != nil {
- logs.Error(err)
- goto re
- }
- if !c.GetAddStatus() {
- logs.Error(errAdd, v.Ports, v.Remark)
- goto re
- }
- if v.Mode == "file" {
- //start local file server
- go startLocalFileServer(cnf.CommonConfig, v, vkey)
- }
- }
- //create local server secret or p2p
- for _, v := range cnf.LocalServer {
- go StartLocalServer(v, cnf.CommonConfig)
- }
- c.Close()
- if cnf.CommonConfig.Client.WebUserName == "" || cnf.CommonConfig.Client.WebPassword == "" {
- logs.Notice("web access login username:user password:%s", vkey)
- } else {
- logs.Notice("web access login username:%s password:%s", cnf.CommonConfig.Client.WebUserName, cnf.CommonConfig.Client.WebPassword)
- }
- NewRPClient(cnf.CommonConfig.Server, vkey, cnf.CommonConfig.Tp, cnf.CommonConfig.ProxyUrl, cnf).Start()
- CloseLocalServer()
- goto re
- }
- // Create a new connection with the server and verify it
- func NewConn(tp string, vkey string, server string, connType string, proxyUrl string) (*conn.Conn, error) {
- var err error
- var connection net.Conn
- var sess *kcp.UDPSession
- if tp == "tcp" {
- if proxyUrl != "" {
- u, er := url.Parse(proxyUrl)
- if er != nil {
- return nil, er
- }
- switch u.Scheme {
- case "socks5":
- n, er := proxy.FromURL(u, nil)
- if er != nil {
- return nil, er
- }
- connection, err = n.Dial("tcp", server)
- case "http":
- connection, err = NewHttpProxyConn(u, server)
- }
- } else {
- connection, err = net.Dial("tcp", server)
- }
- } else {
- sess, err = kcp.DialWithOptions(server, nil, 10, 3)
- if err == nil {
- conn.SetUdpSession(sess)
- connection = sess
- }
- }
- if err != nil {
- return nil, err
- }
- connection.SetDeadline(time.Now().Add(time.Second * 10))
- defer connection.SetDeadline(time.Time{})
- c := conn.NewConn(connection)
- if _, err := c.Write([]byte(common.CONN_TEST)); err != nil {
- return nil, err
- }
- if _, err := c.Write([]byte(crypt.Md5(version.GetVersion()))); err != nil {
- return nil, err
- }
- if b, err := c.GetShortContent(32); err != nil || crypt.Md5(version.GetVersion()) != string(b) {
- logs.Error("The client does not match the server version. The current version of the client is", version.GetVersion())
- return nil, err
- }
- if _, err := c.Write([]byte(common.Getverifyval(vkey))); err != nil {
- return nil, err
- }
- if s, err := c.ReadFlag(); err != nil {
- return nil, err
- } else if s == common.VERIFY_EER {
- logs.Error("Validation key %s incorrect", vkey)
- os.Exit(0)
- }
- if _, err := c.Write([]byte(connType)); err != nil {
- return nil, err
- }
- c.SetAlive(tp)
- return c, nil
- }
- //http proxy connection
- func NewHttpProxyConn(url *url.URL, remoteAddr string) (net.Conn, error) {
- req := &http.Request{
- Method: "CONNECT",
- URL: url,
- Host: remoteAddr,
- Header: http.Header{},
- Proto: "HTTP/1.1",
- }
- password, _ := url.User.Password()
- req.Header.Set("Proxy-Authorization", "Basic "+basicAuth(url.User.Username(), password))
- b, err := httputil.DumpRequest(req, false)
- if err != nil {
- return nil, err
- }
- proxyConn, err := net.Dial("tcp", url.Host)
- if err != nil {
- return nil, err
- }
- if _, err := proxyConn.Write(b); err != nil {
- return nil, err
- }
- buf := make([]byte, 1024)
- if _, err := proxyConn.Read(buf); err != nil {
- return nil, err
- }
- return proxyConn, nil
- }
- //get a basic auth string
- func basicAuth(username, password string) string {
- auth := username + ":" + password
- return base64.StdEncoding.EncodeToString([]byte(auth))
- }
- func handleP2PUdp(rAddr, md5Password, role string) (remoteAddress string, c net.PacketConn, err error) {
- tmpConn, err := common.GetLocalUdpAddr()
- if err != nil {
- logs.Error(err)
- return
- }
- localConn, err := newUdpConnByAddr(tmpConn.LocalAddr().String())
- if err != nil {
- logs.Error(err)
- return
- }
- localKcpConn, err := kcp.NewConn(rAddr, nil, 150, 3, localConn)
- if err != nil {
- logs.Error(err)
- return
- }
- conn.SetUdpSession(localKcpConn)
- localToolConn := conn.NewConn(localKcpConn)
- //get local nat type
- //localNatType, host, err := stun.NewClient().Discover()
- //if err != nil || host == nil {
- // err = errors.New("get nat type error")
- // return
- //}
- localNatType := stun.NATRestricted
- //write password
- if _, err = localToolConn.Write([]byte(md5Password)); err != nil {
- return
- }
- //write role
- if _, err = localToolConn.Write([]byte(role)); err != nil {
- return
- }
- if err = binary.Write(localToolConn, binary.LittleEndian, int32(localNatType)); err != nil {
- return
- }
- //get another type address and nat type from server
- var remoteAddr []byte
- var remoteNatType int32
- if remoteAddr, err = localToolConn.GetShortLenContent(); err != nil {
- return
- }
- if err = binary.Read(localToolConn, binary.LittleEndian, &remoteNatType); err != nil {
- return
- }
- localConn.Close()
- //logs.Trace("remote nat type %d,local nat type %s", remoteNatType, localNatType)
- if remoteAddress, err = sendP2PTestMsg(string(remoteAddr), tmpConn.LocalAddr().String()); err != nil {
- return
- }
- c, err = newUdpConnByAddr(tmpConn.LocalAddr().String())
- return
- }
- func handleP2P(natType1, natType2 int, addr1, addr2 string, role string) (string, error) {
- switch natType1 {
- case int(stun.NATFull):
- return sendP2PTestMsg(addr2, addr1)
- case int(stun.NATRestricted):
- switch natType2 {
- case int(stun.NATFull), int(stun.NATRestricted), int(stun.NATPortRestricted), int(stun.NATSymetric):
- return sendP2PTestMsg(addr2, addr1)
- }
- case int(stun.NATPortRestricted):
- switch natType2 {
- case int(stun.NATFull), int(stun.NATRestricted), int(stun.NATPortRestricted):
- return sendP2PTestMsg(addr2, addr1)
- }
- case int(stun.NATSymetric):
- switch natType2 {
- case int(stun.NATFull), int(stun.NATRestricted):
- return sendP2PTestMsg(addr2, addr1)
- }
- }
- return "", errors.New("not support p2p")
- }
- func sendP2PTestMsg(remoteAddr string, localAddr string) (string, error) {
- remoteUdpAddr, err := net.ResolveUDPAddr("udp", remoteAddr)
- if err != nil {
- return "", err
- }
- localConn, err := newUdpConnByAddr(localAddr)
- if err != nil {
- return "", err
- }
- defer localConn.Close()
- ticker := time.NewTicker(time.Millisecond * 500)
- go func(ticker *time.Ticker) {
- for {
- select {
- case <-ticker.C:
- logs.Trace("try send test packet to target %s", remoteAddr)
- if _, err := localConn.WriteTo([]byte(common.WORK_P2P_CONNECT), remoteUdpAddr); err != nil {
- return
- }
- }
- }
- }(ticker)
- buf := make([]byte, 10)
- for {
- localConn.SetReadDeadline(time.Now().Add(time.Second * 30))
- n, addr, err := localConn.ReadFromUDP(buf)
- localConn.SetReadDeadline(time.Time{})
- if err != nil {
- break
- }
- switch string(buf[:n]) {
- case common.WORK_P2P_SUCCESS:
- for i := 20; i > 0; i-- {
- if _, err = localConn.WriteTo([]byte(common.WORK_P2P_END), addr); err != nil {
- return "", err
- }
- }
- return addr.String(), nil
- case common.WORK_P2P_END:
- logs.Trace("Remotely Address %s Reply Packet Successfully Received", addr.String())
- return addr.String(), nil
- case common.WORK_P2P_CONNECT:
- go func() {
- for i := 20; i > 0; i-- {
- logs.Trace("try send receive success packet to target %s", remoteAddr)
- if _, err = localConn.WriteTo([]byte(common.WORK_P2P_SUCCESS), addr); err != nil {
- return
- }
- time.Sleep(time.Second)
- }
- }()
- default:
- continue
- }
- ticker.Stop()
- }
- ticker.Stop()
- return "", errors.New("connect to the target failed, maybe the nat type is not support p2p")
- }
- func newUdpConnByAddr(addr string) (*net.UDPConn, error) {
- udpAddr, err := net.ResolveUDPAddr("udp", addr)
- if err != nil {
- return nil, err
- }
- udpConn, err := net.ListenUDP("udp", udpAddr)
- if err != nil {
- return nil, err
- }
- return udpConn, nil
- }
|