bridge.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505
  1. package bridge
  2. import (
  3. "encoding/binary"
  4. "errors"
  5. "fmt"
  6. "github.com/cnlh/nps/lib/common"
  7. "github.com/cnlh/nps/lib/conn"
  8. "github.com/cnlh/nps/lib/crypt"
  9. "github.com/cnlh/nps/lib/file"
  10. "github.com/cnlh/nps/lib/mux"
  11. "github.com/cnlh/nps/lib/version"
  12. "github.com/cnlh/nps/server/connection"
  13. "github.com/cnlh/nps/server/tool"
  14. "github.com/cnlh/nps/vender/github.com/astaxie/beego"
  15. "github.com/cnlh/nps/vender/github.com/astaxie/beego/logs"
  16. "net"
  17. "os"
  18. "strconv"
  19. "strings"
  20. "sync"
  21. "time"
  22. )
  23. type Client struct {
  24. tunnel *mux.Mux
  25. signal *conn.Conn
  26. file *mux.Mux
  27. retryTime int // it will be add 1 when ping not ok until to 3 will close the client
  28. }
  29. func NewClient(t, f *mux.Mux, s *conn.Conn) *Client {
  30. return &Client{
  31. signal: s,
  32. tunnel: t,
  33. file: f,
  34. }
  35. }
  36. type Bridge struct {
  37. TunnelPort int //通信隧道端口
  38. Client sync.Map
  39. Register sync.Map
  40. tunnelType string //bridge type kcp or tcp
  41. OpenTask chan *file.Tunnel
  42. CloseTask chan *file.Tunnel
  43. CloseClient chan int
  44. SecretChan chan *conn.Secret
  45. ipVerify bool
  46. runList map[int]interface{}
  47. }
  48. func NewTunnel(tunnelPort int, tunnelType string, ipVerify bool, runList map[int]interface{}) *Bridge {
  49. return &Bridge{
  50. TunnelPort: tunnelPort,
  51. tunnelType: tunnelType,
  52. OpenTask: make(chan *file.Tunnel),
  53. CloseTask: make(chan *file.Tunnel),
  54. CloseClient: make(chan int),
  55. SecretChan: make(chan *conn.Secret),
  56. ipVerify: ipVerify,
  57. runList: runList,
  58. }
  59. }
  60. func (s *Bridge) StartTunnel() error {
  61. go s.ping()
  62. if s.tunnelType == "kcp" {
  63. logs.Info("server start, the bridge type is %s, the bridge port is %d", s.tunnelType, s.TunnelPort)
  64. return conn.NewKcpListenerAndProcess(beego.AppConfig.String("bridge_ip")+":"+beego.AppConfig.String("bridge_port"), func(c net.Conn) {
  65. s.cliProcess(conn.NewConn(c))
  66. })
  67. } else {
  68. listener, err := connection.GetBridgeListener(s.tunnelType)
  69. if err != nil {
  70. logs.Error(err)
  71. os.Exit(0)
  72. return err
  73. }
  74. conn.Accept(listener, func(c net.Conn) {
  75. s.cliProcess(conn.NewConn(c))
  76. })
  77. }
  78. return nil
  79. }
  80. //get health information form client
  81. func (s *Bridge) GetHealthFromClient(id int, c *conn.Conn) {
  82. for {
  83. if info, status, err := c.GetHealthInfo(); err != nil {
  84. break
  85. } else if !status { //the status is true , return target to the targetArr
  86. file.GetCsvDb().Tasks.Range(func(key, value interface{}) bool {
  87. v := value.(*file.Tunnel)
  88. if v.Client.Id == id && v.Mode == "tcp" && strings.Contains(v.Target, info) {
  89. v.Lock()
  90. if v.TargetArr == nil || (len(v.TargetArr) == 0 && len(v.HealthRemoveArr) == 0) {
  91. v.TargetArr = common.TrimArr(strings.Split(v.Target, "\n"))
  92. }
  93. v.TargetArr = common.RemoveArrVal(v.TargetArr, info)
  94. if v.HealthRemoveArr == nil {
  95. v.HealthRemoveArr = make([]string, 0)
  96. }
  97. v.HealthRemoveArr = append(v.HealthRemoveArr, info)
  98. v.Unlock()
  99. }
  100. return true
  101. })
  102. file.GetCsvDb().Hosts.Range(func(key, value interface{}) bool {
  103. v := value.(*file.Host)
  104. if v.Client.Id == id && strings.Contains(v.Target, info) {
  105. v.Lock()
  106. if v.TargetArr == nil || (len(v.TargetArr) == 0 && len(v.HealthRemoveArr) == 0) {
  107. v.TargetArr = common.TrimArr(strings.Split(v.Target, "\n"))
  108. }
  109. v.TargetArr = common.RemoveArrVal(v.TargetArr, info)
  110. if v.HealthRemoveArr == nil {
  111. v.HealthRemoveArr = make([]string, 0)
  112. }
  113. v.HealthRemoveArr = append(v.HealthRemoveArr, info)
  114. v.Unlock()
  115. }
  116. return true
  117. })
  118. } else { //the status is false,remove target from the targetArr
  119. file.GetCsvDb().Tasks.Range(func(key, value interface{}) bool {
  120. v := value.(*file.Tunnel)
  121. if v.Client.Id == id && v.Mode == "tcp" && common.IsArrContains(v.HealthRemoveArr, info) && !common.IsArrContains(v.TargetArr, info) {
  122. v.Lock()
  123. v.TargetArr = append(v.TargetArr, info)
  124. v.HealthRemoveArr = common.RemoveArrVal(v.HealthRemoveArr, info)
  125. v.Unlock()
  126. }
  127. return true
  128. })
  129. file.GetCsvDb().Hosts.Range(func(key, value interface{}) bool {
  130. v := value.(*file.Host)
  131. if v.Client.Id == id && common.IsArrContains(v.HealthRemoveArr, info) && !common.IsArrContains(v.TargetArr, info) {
  132. v.Lock()
  133. v.TargetArr = append(v.TargetArr, info)
  134. v.HealthRemoveArr = common.RemoveArrVal(v.HealthRemoveArr, info)
  135. v.Unlock()
  136. }
  137. return true
  138. })
  139. }
  140. }
  141. s.DelClient(id, )
  142. }
  143. //验证失败,返回错误验证flag,并且关闭连接
  144. func (s *Bridge) verifyError(c *conn.Conn) {
  145. c.Write([]byte(common.VERIFY_EER))
  146. c.Conn.Close()
  147. }
  148. func (s *Bridge) verifySuccess(c *conn.Conn) {
  149. c.Write([]byte(common.VERIFY_SUCCESS))
  150. }
  151. func (s *Bridge) cliProcess(c *conn.Conn) {
  152. //read test flag
  153. if _, err := c.GetShortContent(3); err != nil {
  154. logs.Info("The client %s connect error", c.Conn.RemoteAddr())
  155. return
  156. }
  157. //version check
  158. if b, err := c.GetShortContent(32); err != nil || string(b) != crypt.Md5(version.GetVersion()) {
  159. logs.Info("The client %s version does not match", c.Conn.RemoteAddr())
  160. c.Close()
  161. return
  162. }
  163. //write server version to client
  164. c.Write([]byte(crypt.Md5(version.GetVersion())))
  165. c.SetReadDeadline(5, s.tunnelType)
  166. var buf []byte
  167. var err error
  168. //get vKey from client
  169. if buf, err = c.GetShortContent(32); err != nil {
  170. c.Close()
  171. return
  172. }
  173. //verify
  174. id, err := file.GetCsvDb().GetIdByVerifyKey(string(buf), c.Conn.RemoteAddr().String())
  175. if err != nil {
  176. logs.Info("Current client connection validation error, close this client:", c.Conn.RemoteAddr())
  177. s.verifyError(c)
  178. return
  179. } else {
  180. s.verifySuccess(c)
  181. }
  182. if flag, err := c.ReadFlag(); err == nil {
  183. s.typeDeal(flag, c, id)
  184. } else {
  185. logs.Warn(err, flag)
  186. }
  187. return
  188. }
  189. func (s *Bridge) DelClient(id int) {
  190. if v, ok := s.Client.Load(id); ok {
  191. if v.(*Client).signal != nil {
  192. v.(*Client).signal.Close()
  193. }
  194. s.Client.Delete(id)
  195. if file.GetCsvDb().IsPubClient(id) {
  196. return
  197. }
  198. if c, err := file.GetCsvDb().GetClient(id); err == nil && c.NoStore {
  199. s.CloseClient <- c.Id
  200. }
  201. }
  202. }
  203. //use different
  204. func (s *Bridge) typeDeal(typeVal string, c *conn.Conn, id int) {
  205. isPub := file.GetCsvDb().IsPubClient(id)
  206. switch typeVal {
  207. case common.WORK_MAIN:
  208. if isPub {
  209. c.Close()
  210. return
  211. }
  212. //the vKey connect by another ,close the client of before
  213. if v, ok := s.Client.LoadOrStore(id, NewClient(nil, nil, c)); ok {
  214. if v.(*Client).signal != nil {
  215. v.(*Client).signal.WriteClose()
  216. }
  217. v.(*Client).signal = c
  218. }
  219. go s.GetHealthFromClient(id, c)
  220. logs.Info("clientId %d connection succeeded, address:%s ", id, c.Conn.RemoteAddr())
  221. case common.WORK_CHAN:
  222. muxConn := mux.NewMux(c.Conn, s.tunnelType)
  223. if v, ok := s.Client.LoadOrStore(id, NewClient(muxConn, nil, nil)); ok {
  224. v.(*Client).tunnel = muxConn
  225. }
  226. case common.WORK_CONFIG:
  227. client, err := file.GetCsvDb().GetClient(id)
  228. if err != nil || (!isPub && !client.ConfigConnAllow) {
  229. c.Close()
  230. return
  231. }
  232. binary.Write(c, binary.LittleEndian, isPub)
  233. go s.getConfig(c, isPub, client)
  234. case common.WORK_REGISTER:
  235. go s.register(c)
  236. case common.WORK_SECRET:
  237. if b, err := c.GetShortContent(32); err == nil {
  238. s.SecretChan <- conn.NewSecret(string(b), c)
  239. }
  240. case common.WORK_FILE:
  241. muxConn := mux.NewMux(c.Conn, s.tunnelType)
  242. if v, ok := s.Client.LoadOrStore(id, NewClient(nil, muxConn, nil)); ok {
  243. v.(*Client).file = muxConn
  244. }
  245. case common.WORK_P2P:
  246. //read md5 secret
  247. if b, err := c.GetShortContent(32); err != nil {
  248. return
  249. } else if t := file.GetCsvDb().GetTaskByMd5Password(string(b)); t == nil {
  250. return
  251. } else {
  252. if v, ok := s.Client.Load(t.Client.Id); !ok {
  253. return
  254. } else {
  255. //向密钥对应的客户端发送与服务端udp建立连接信息,地址,密钥
  256. v.(*Client).signal.Write([]byte(common.NEW_UDP_CONN))
  257. svrAddr := beego.AppConfig.String("p2p_ip") + ":" + beego.AppConfig.String("p2p_port")
  258. if err != nil {
  259. logs.Warn("get local udp addr error")
  260. return
  261. }
  262. v.(*Client).signal.WriteLenContent([]byte(svrAddr))
  263. v.(*Client).signal.WriteLenContent(b)
  264. //向该请求者发送建立连接请求,服务器地址
  265. c.WriteLenContent([]byte(svrAddr))
  266. }
  267. }
  268. }
  269. c.SetAlive(s.tunnelType)
  270. return
  271. }
  272. //register ip
  273. func (s *Bridge) register(c *conn.Conn) {
  274. var hour int32
  275. if err := binary.Read(c, binary.LittleEndian, &hour); err == nil {
  276. s.Register.Store(common.GetIpByAddr(c.Conn.RemoteAddr().String()), time.Now().Add(time.Hour*time.Duration(hour)))
  277. }
  278. }
  279. func (s *Bridge) SendLinkInfo(clientId int, link *conn.Link, linkAddr string, t *file.Tunnel) (target net.Conn, err error) {
  280. if v, ok := s.Client.Load(clientId); ok {
  281. //If ip is restricted to do ip verification
  282. if s.ipVerify {
  283. ip := common.GetIpByAddr(linkAddr)
  284. if v, ok := s.Register.Load(ip); !ok {
  285. return nil, errors.New(fmt.Sprintf("The ip %s is not in the validation list", ip))
  286. } else {
  287. if !v.(time.Time).After(time.Now()) {
  288. return nil, errors.New(fmt.Sprintf("The validity of the ip %s has expired", ip))
  289. }
  290. }
  291. }
  292. var tunnel *mux.Mux
  293. if t != nil && t.Mode == "file" {
  294. tunnel = v.(*Client).file
  295. } else {
  296. tunnel = v.(*Client).tunnel
  297. }
  298. if tunnel == nil {
  299. err = errors.New("the client connect error")
  300. return
  301. }
  302. if target, err = tunnel.NewConn(); err != nil {
  303. return
  304. }
  305. if t != nil && t.Mode == "file" {
  306. return
  307. }
  308. if _, err = conn.NewConn(target).SendLinkInfo(link); err != nil {
  309. logs.Info("new connect error ,the target %s refuse to connect", link.Host)
  310. return
  311. }
  312. } else {
  313. err = errors.New(fmt.Sprintf("the client %d is not connect", clientId))
  314. }
  315. return
  316. }
  317. func (s *Bridge) ping() {
  318. ticker := time.NewTicker(time.Second * 5)
  319. for {
  320. select {
  321. case <-ticker.C:
  322. arr := make([]int, 0)
  323. s.Client.Range(func(key, value interface{}) bool {
  324. v := value.(*Client)
  325. if v.tunnel == nil || v.signal == nil {
  326. v.retryTime += 1
  327. if v.retryTime >= 3 {
  328. arr = append(arr, key.(int))
  329. }
  330. return true
  331. }
  332. if v.tunnel.IsClose {
  333. arr = append(arr, key.(int))
  334. }
  335. return true
  336. })
  337. for _, v := range arr {
  338. logs.Info("the client %d closed", v)
  339. s.DelClient(v)
  340. }
  341. }
  342. }
  343. }
  344. //get config and add task from client config
  345. func (s *Bridge) getConfig(c *conn.Conn, isPub bool, client *file.Client) {
  346. var fail bool
  347. loop:
  348. for {
  349. flag, err := c.ReadFlag()
  350. if err != nil {
  351. break
  352. }
  353. switch flag {
  354. case common.WORK_STATUS:
  355. if b, err := c.GetShortContent(32); err != nil {
  356. break loop
  357. } else {
  358. var str string
  359. id, err := file.GetCsvDb().GetClientIdByVkey(string(b))
  360. if err != nil {
  361. break loop
  362. }
  363. file.GetCsvDb().Hosts.Range(func(key, value interface{}) bool {
  364. v := value.(*file.Host)
  365. if v.Client.Id == id {
  366. str += v.Remark + common.CONN_DATA_SEQ
  367. }
  368. return true
  369. })
  370. file.GetCsvDb().Tasks.Range(func(key, value interface{}) bool {
  371. v := value.(*file.Tunnel)
  372. if _, ok := s.runList[v.Id]; ok && v.Client.Id == id {
  373. str += v.Remark + common.CONN_DATA_SEQ
  374. }
  375. return true
  376. })
  377. binary.Write(c, binary.LittleEndian, int32(len([]byte(str))))
  378. binary.Write(c, binary.LittleEndian, []byte(str))
  379. }
  380. case common.NEW_CONF:
  381. var err error
  382. if client, err = c.GetConfigInfo(); err != nil {
  383. fail = true
  384. c.WriteAddFail()
  385. break loop
  386. } else {
  387. if err = file.GetCsvDb().NewClient(client); err != nil {
  388. fail = true
  389. c.WriteAddFail()
  390. break loop
  391. }
  392. c.WriteAddOk()
  393. c.Write([]byte(client.VerifyKey))
  394. s.Client.Store(client.Id, NewClient(nil, nil, nil))
  395. }
  396. case common.NEW_HOST:
  397. h, err := c.GetHostInfo()
  398. if err != nil {
  399. fail = true
  400. c.WriteAddFail()
  401. break loop
  402. }
  403. h.Client = client
  404. if h.Location == "" {
  405. h.Location = "/"
  406. }
  407. if !client.HasHost(h) {
  408. if file.GetCsvDb().IsHostExist(h) {
  409. fail = true
  410. c.WriteAddFail()
  411. break loop
  412. } else {
  413. file.GetCsvDb().NewHost(h)
  414. c.WriteAddOk()
  415. }
  416. } else {
  417. c.WriteAddOk()
  418. }
  419. case common.NEW_TASK:
  420. if t, err := c.GetTaskInfo(); err != nil {
  421. fail = true
  422. c.WriteAddFail()
  423. break loop
  424. } else {
  425. ports := common.GetPorts(t.Ports)
  426. targets := common.GetPorts(t.Target)
  427. if len(ports) > 1 && (t.Mode == "tcp" || t.Mode == "udp") && (len(ports) != len(targets)) {
  428. fail = true
  429. c.WriteAddFail()
  430. break loop
  431. } else if t.Mode == "secret" {
  432. ports = append(ports, 0)
  433. }
  434. if len(ports) == 0 {
  435. fail = true
  436. c.WriteAddFail()
  437. break loop
  438. }
  439. for i := 0; i < len(ports); i++ {
  440. tl := new(file.Tunnel)
  441. tl.Mode = t.Mode
  442. tl.Port = ports[i]
  443. tl.ServerIp = t.ServerIp
  444. if len(ports) == 1 {
  445. tl.Target = t.Target
  446. tl.Remark = t.Remark
  447. } else {
  448. tl.Remark = t.Remark + "_" + strconv.Itoa(tl.Port)
  449. if t.TargetAddr != "" {
  450. tl.Target = t.TargetAddr + ":" + strconv.Itoa(targets[i])
  451. } else {
  452. tl.Target = strconv.Itoa(targets[i])
  453. }
  454. }
  455. tl.Id = int(file.GetCsvDb().GetTaskId())
  456. tl.Status = true
  457. tl.Flow = new(file.Flow)
  458. tl.NoStore = true
  459. tl.Client = client
  460. tl.Password = t.Password
  461. tl.LocalPath = t.LocalPath
  462. tl.StripPre = t.StripPre
  463. if !client.HasTunnel(tl) {
  464. if err := file.GetCsvDb().NewTask(tl); err != nil {
  465. logs.Notice("Add task error ", err.Error())
  466. fail = true
  467. c.WriteAddFail()
  468. break loop
  469. }
  470. if b := tool.TestServerPort(tl.Port, tl.Mode); !b && t.Mode != "secret" && t.Mode != "p2p" {
  471. fail = true
  472. c.WriteAddFail()
  473. break loop
  474. } else {
  475. s.OpenTask <- tl
  476. }
  477. }
  478. c.WriteAddOk()
  479. }
  480. }
  481. }
  482. }
  483. if fail && client != nil {
  484. s.DelClient(client.Id)
  485. }
  486. c.Close()
  487. }