bridge.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536
  1. package bridge
  2. import (
  3. "ehang.io/nps-mux"
  4. "encoding/binary"
  5. "errors"
  6. "fmt"
  7. "net"
  8. "os"
  9. "strconv"
  10. "strings"
  11. "sync"
  12. "time"
  13. "ehang.io/nps/lib/common"
  14. "ehang.io/nps/lib/conn"
  15. "ehang.io/nps/lib/crypt"
  16. "ehang.io/nps/lib/file"
  17. "ehang.io/nps/lib/version"
  18. "ehang.io/nps/server/connection"
  19. "ehang.io/nps/server/tool"
  20. "github.com/astaxie/beego"
  21. "github.com/astaxie/beego/logs"
  22. )
  23. type Client struct {
  24. tunnel *nps_mux.Mux
  25. signal *conn.Conn
  26. file *nps_mux.Mux
  27. Version string
  28. retryTime int // it will be add 1 when ping not ok until to 3 will close the client
  29. }
  30. func NewClient(t, f *nps_mux.Mux, s *conn.Conn, vs string) *Client {
  31. return &Client{
  32. signal: s,
  33. tunnel: t,
  34. file: f,
  35. Version: vs,
  36. }
  37. }
  38. type Bridge struct {
  39. TunnelPort int //通信隧道端口
  40. Client sync.Map
  41. Register sync.Map
  42. tunnelType string //bridge type kcp or tcp
  43. OpenTask chan *file.Tunnel
  44. CloseTask chan *file.Tunnel
  45. CloseClient chan int
  46. SecretChan chan *conn.Secret
  47. ipVerify bool
  48. runList sync.Map //map[int]interface{}
  49. disconnectTime int
  50. }
  51. func NewTunnel(tunnelPort int, tunnelType string, ipVerify bool, runList sync.Map, disconnectTime int) *Bridge {
  52. return &Bridge{
  53. TunnelPort: tunnelPort,
  54. tunnelType: tunnelType,
  55. OpenTask: make(chan *file.Tunnel),
  56. CloseTask: make(chan *file.Tunnel),
  57. CloseClient: make(chan int),
  58. SecretChan: make(chan *conn.Secret),
  59. ipVerify: ipVerify,
  60. runList: runList,
  61. disconnectTime: disconnectTime,
  62. }
  63. }
  64. func (s *Bridge) StartTunnel() error {
  65. go s.ping()
  66. if s.tunnelType == "kcp" {
  67. logs.Info("server start, the bridge type is %s, the bridge port is %d", s.tunnelType, s.TunnelPort)
  68. return conn.NewKcpListenerAndProcess(beego.AppConfig.String("bridge_ip")+":"+beego.AppConfig.String("bridge_port"), func(c net.Conn) {
  69. s.cliProcess(conn.NewConn(c))
  70. })
  71. } else {
  72. listener, err := connection.GetBridgeListener(s.tunnelType)
  73. if err != nil {
  74. logs.Error(err)
  75. os.Exit(0)
  76. return err
  77. }
  78. conn.Accept(listener, func(c net.Conn) {
  79. s.cliProcess(conn.NewConn(c))
  80. })
  81. }
  82. return nil
  83. }
  84. //get health information form client
  85. func (s *Bridge) GetHealthFromClient(id int, c *conn.Conn) {
  86. for {
  87. if info, status, err := c.GetHealthInfo(); err != nil {
  88. break
  89. } else if !status { //the status is true , return target to the targetArr
  90. file.GetDb().JsonDb.Tasks.Range(func(key, value interface{}) bool {
  91. v := value.(*file.Tunnel)
  92. if v.Client.Id == id && v.Mode == "tcp" && strings.Contains(v.Target.TargetStr, info) {
  93. v.Lock()
  94. if v.Target.TargetArr == nil || (len(v.Target.TargetArr) == 0 && len(v.HealthRemoveArr) == 0) {
  95. v.Target.TargetArr = common.TrimArr(strings.Split(v.Target.TargetStr, "\n"))
  96. }
  97. v.Target.TargetArr = common.RemoveArrVal(v.Target.TargetArr, info)
  98. if v.HealthRemoveArr == nil {
  99. v.HealthRemoveArr = make([]string, 0)
  100. }
  101. v.HealthRemoveArr = append(v.HealthRemoveArr, info)
  102. v.Unlock()
  103. }
  104. return true
  105. })
  106. file.GetDb().JsonDb.Hosts.Range(func(key, value interface{}) bool {
  107. v := value.(*file.Host)
  108. if v.Client.Id == id && strings.Contains(v.Target.TargetStr, info) {
  109. v.Lock()
  110. if v.Target.TargetArr == nil || (len(v.Target.TargetArr) == 0 && len(v.HealthRemoveArr) == 0) {
  111. v.Target.TargetArr = common.TrimArr(strings.Split(v.Target.TargetStr, "\n"))
  112. }
  113. v.Target.TargetArr = common.RemoveArrVal(v.Target.TargetArr, info)
  114. if v.HealthRemoveArr == nil {
  115. v.HealthRemoveArr = make([]string, 0)
  116. }
  117. v.HealthRemoveArr = append(v.HealthRemoveArr, info)
  118. v.Unlock()
  119. }
  120. return true
  121. })
  122. } else { //the status is false,remove target from the targetArr
  123. file.GetDb().JsonDb.Tasks.Range(func(key, value interface{}) bool {
  124. v := value.(*file.Tunnel)
  125. if v.Client.Id == id && v.Mode == "tcp" && common.IsArrContains(v.HealthRemoveArr, info) && !common.IsArrContains(v.Target.TargetArr, info) {
  126. v.Lock()
  127. v.Target.TargetArr = append(v.Target.TargetArr, info)
  128. v.HealthRemoveArr = common.RemoveArrVal(v.HealthRemoveArr, info)
  129. v.Unlock()
  130. }
  131. return true
  132. })
  133. file.GetDb().JsonDb.Hosts.Range(func(key, value interface{}) bool {
  134. v := value.(*file.Host)
  135. if v.Client.Id == id && common.IsArrContains(v.HealthRemoveArr, info) && !common.IsArrContains(v.Target.TargetArr, info) {
  136. v.Lock()
  137. v.Target.TargetArr = append(v.Target.TargetArr, info)
  138. v.HealthRemoveArr = common.RemoveArrVal(v.HealthRemoveArr, info)
  139. v.Unlock()
  140. }
  141. return true
  142. })
  143. }
  144. }
  145. s.DelClient(id)
  146. }
  147. //验证失败,返回错误验证flag,并且关闭连接
  148. func (s *Bridge) verifyError(c *conn.Conn) {
  149. c.Write([]byte(common.VERIFY_EER))
  150. }
  151. func (s *Bridge) verifySuccess(c *conn.Conn) {
  152. c.Write([]byte(common.VERIFY_SUCCESS))
  153. }
  154. func (s *Bridge) cliProcess(c *conn.Conn) {
  155. //read test flag
  156. if _, err := c.GetShortContent(3); err != nil {
  157. logs.Info("The client %s connect error", c.Conn.RemoteAddr(), err.Error())
  158. return
  159. }
  160. //version check
  161. if b, err := c.GetShortLenContent(); err != nil || string(b) != version.GetVersion() {
  162. logs.Info("The client %s version does not match", c.Conn.RemoteAddr())
  163. c.Close()
  164. return
  165. }
  166. //version get
  167. var vs []byte
  168. var err error
  169. if vs, err = c.GetShortLenContent(); err != nil {
  170. logs.Info("get client %s version error", err.Error())
  171. c.Close()
  172. return
  173. }
  174. //write server version to client
  175. c.Write([]byte(crypt.Md5(version.GetVersion())))
  176. c.SetReadDeadlineBySecond(5)
  177. var buf []byte
  178. //get vKey from client
  179. if buf, err = c.GetShortContent(32); err != nil {
  180. c.Close()
  181. return
  182. }
  183. //verify
  184. id, err := file.GetDb().GetIdByVerifyKey(string(buf), c.Conn.RemoteAddr().String())
  185. if err != nil {
  186. logs.Info("Current client connection validation error, close this client:", c.Conn.RemoteAddr())
  187. s.verifyError(c)
  188. return
  189. } else {
  190. s.verifySuccess(c)
  191. }
  192. if flag, err := c.ReadFlag(); err == nil {
  193. s.typeDeal(flag, c, id, string(vs))
  194. } else {
  195. logs.Warn(err, flag)
  196. }
  197. return
  198. }
  199. func (s *Bridge) DelClient(id int) {
  200. if v, ok := s.Client.Load(id); ok {
  201. if v.(*Client).signal != nil {
  202. v.(*Client).signal.Close()
  203. }
  204. s.Client.Delete(id)
  205. if file.GetDb().IsPubClient(id) {
  206. return
  207. }
  208. if c, err := file.GetDb().GetClient(id); err == nil {
  209. s.CloseClient <- c.Id
  210. }
  211. }
  212. }
  213. //use different
  214. func (s *Bridge) typeDeal(typeVal string, c *conn.Conn, id int, vs string) {
  215. isPub := file.GetDb().IsPubClient(id)
  216. switch typeVal {
  217. case common.WORK_MAIN:
  218. if isPub {
  219. c.Close()
  220. return
  221. }
  222. tcpConn, ok := c.Conn.(*net.TCPConn)
  223. if ok {
  224. // add tcp keep alive option for signal connection
  225. _ = tcpConn.SetKeepAlive(true)
  226. _ = tcpConn.SetKeepAlivePeriod(5 * time.Second)
  227. }
  228. //the vKey connect by another ,close the client of before
  229. if v, ok := s.Client.LoadOrStore(id, NewClient(nil, nil, c, vs)); ok {
  230. if v.(*Client).signal != nil {
  231. v.(*Client).signal.WriteClose()
  232. }
  233. v.(*Client).signal = c
  234. v.(*Client).Version = vs
  235. }
  236. go s.GetHealthFromClient(id, c)
  237. logs.Info("clientId %d connection succeeded, address:%s ", id, c.Conn.RemoteAddr())
  238. case common.WORK_CHAN:
  239. muxConn := nps_mux.NewMux(c.Conn, s.tunnelType, s.disconnectTime)
  240. if v, ok := s.Client.LoadOrStore(id, NewClient(muxConn, nil, nil, vs)); ok {
  241. v.(*Client).tunnel = muxConn
  242. }
  243. case common.WORK_CONFIG:
  244. client, err := file.GetDb().GetClient(id)
  245. if err != nil || (!isPub && !client.ConfigConnAllow) {
  246. c.Close()
  247. return
  248. }
  249. binary.Write(c, binary.LittleEndian, isPub)
  250. go s.getConfig(c, isPub, client)
  251. case common.WORK_REGISTER:
  252. go s.register(c)
  253. case common.WORK_SECRET:
  254. if b, err := c.GetShortContent(32); err == nil {
  255. s.SecretChan <- conn.NewSecret(string(b), c)
  256. } else {
  257. logs.Error("secret error, failed to match the key successfully")
  258. }
  259. case common.WORK_FILE:
  260. muxConn := nps_mux.NewMux(c.Conn, s.tunnelType, s.disconnectTime)
  261. if v, ok := s.Client.LoadOrStore(id, NewClient(nil, muxConn, nil, vs)); ok {
  262. v.(*Client).file = muxConn
  263. }
  264. case common.WORK_P2P:
  265. //read md5 secret
  266. if b, err := c.GetShortContent(32); err != nil {
  267. logs.Error("p2p error,", err.Error())
  268. } else if t := file.GetDb().GetTaskByMd5Password(string(b)); t == nil {
  269. logs.Error("p2p error, failed to match the key successfully")
  270. } else {
  271. if v, ok := s.Client.Load(t.Client.Id); !ok {
  272. return
  273. } else {
  274. //向密钥对应的客户端发送与服务端udp建立连接信息,地址,密钥
  275. v.(*Client).signal.Write([]byte(common.NEW_UDP_CONN))
  276. svrAddr := beego.AppConfig.String("p2p_ip") + ":" + beego.AppConfig.String("p2p_port")
  277. if err != nil {
  278. logs.Warn("get local udp addr error")
  279. return
  280. }
  281. v.(*Client).signal.WriteLenContent([]byte(svrAddr))
  282. v.(*Client).signal.WriteLenContent(b)
  283. //向该请求者发送建立连接请求,服务器地址
  284. c.WriteLenContent([]byte(svrAddr))
  285. }
  286. }
  287. }
  288. c.SetAlive(s.tunnelType)
  289. return
  290. }
  291. //register ip
  292. func (s *Bridge) register(c *conn.Conn) {
  293. var hour int32
  294. if err := binary.Read(c, binary.LittleEndian, &hour); err == nil {
  295. s.Register.Store(common.GetIpByAddr(c.Conn.RemoteAddr().String()), time.Now().Add(time.Hour*time.Duration(hour)))
  296. }
  297. }
  298. func (s *Bridge) SendLinkInfo(clientId int, link *conn.Link, t *file.Tunnel) (target net.Conn, err error) {
  299. //if the proxy type is local
  300. if link.LocalProxy {
  301. target, err = net.Dial("tcp", link.Host)
  302. return
  303. }
  304. if v, ok := s.Client.Load(clientId); ok {
  305. //If ip is restricted to do ip verification
  306. if s.ipVerify {
  307. ip := common.GetIpByAddr(link.RemoteAddr)
  308. if v, ok := s.Register.Load(ip); !ok {
  309. return nil, errors.New(fmt.Sprintf("The ip %s is not in the validation list", ip))
  310. } else {
  311. if !v.(time.Time).After(time.Now()) {
  312. return nil, errors.New(fmt.Sprintf("The validity of the ip %s has expired", ip))
  313. }
  314. }
  315. }
  316. var tunnel *nps_mux.Mux
  317. if t != nil && t.Mode == "file" {
  318. tunnel = v.(*Client).file
  319. } else {
  320. tunnel = v.(*Client).tunnel
  321. }
  322. if tunnel == nil {
  323. err = errors.New("the client connect error")
  324. return
  325. }
  326. if target, err = tunnel.NewConn(); err != nil {
  327. return
  328. }
  329. if t != nil && t.Mode == "file" {
  330. //TODO if t.mode is file ,not use crypt or compress
  331. link.Crypt = false
  332. link.Compress = false
  333. return
  334. }
  335. if _, err = conn.NewConn(target).SendInfo(link, ""); err != nil {
  336. logs.Info("new connect error ,the target %s refuse to connect", link.Host)
  337. return
  338. }
  339. } else {
  340. err = errors.New(fmt.Sprintf("the client %d is not connect", clientId))
  341. }
  342. return
  343. }
  344. func (s *Bridge) ping() {
  345. ticker := time.NewTicker(time.Second * 5)
  346. defer ticker.Stop()
  347. for {
  348. select {
  349. case <-ticker.C:
  350. arr := make([]int, 0)
  351. s.Client.Range(func(key, value interface{}) bool {
  352. v := value.(*Client)
  353. if v.tunnel == nil || v.signal == nil {
  354. v.retryTime += 1
  355. if v.retryTime >= 3 {
  356. arr = append(arr, key.(int))
  357. }
  358. return true
  359. }
  360. if v.tunnel.IsClose {
  361. arr = append(arr, key.(int))
  362. }
  363. return true
  364. })
  365. for _, v := range arr {
  366. logs.Info("the client %d closed", v)
  367. s.DelClient(v)
  368. }
  369. }
  370. }
  371. }
  372. //get config and add task from client config
  373. func (s *Bridge) getConfig(c *conn.Conn, isPub bool, client *file.Client) {
  374. var fail bool
  375. loop:
  376. for {
  377. flag, err := c.ReadFlag()
  378. if err != nil {
  379. break
  380. }
  381. switch flag {
  382. case common.WORK_STATUS:
  383. if b, err := c.GetShortContent(32); err != nil {
  384. break loop
  385. } else {
  386. var str string
  387. id, err := file.GetDb().GetClientIdByVkey(string(b))
  388. if err != nil {
  389. break loop
  390. }
  391. file.GetDb().JsonDb.Hosts.Range(func(key, value interface{}) bool {
  392. v := value.(*file.Host)
  393. if v.Client.Id == id {
  394. str += v.Remark + common.CONN_DATA_SEQ
  395. }
  396. return true
  397. })
  398. file.GetDb().JsonDb.Tasks.Range(func(key, value interface{}) bool {
  399. v := value.(*file.Tunnel)
  400. //if _, ok := s.runList[v.Id]; ok && v.Client.Id == id {
  401. if _, ok := s.runList.Load(v.Id); ok && v.Client.Id == id {
  402. str += v.Remark + common.CONN_DATA_SEQ
  403. }
  404. return true
  405. })
  406. binary.Write(c, binary.LittleEndian, int32(len([]byte(str))))
  407. binary.Write(c, binary.LittleEndian, []byte(str))
  408. }
  409. case common.NEW_CONF:
  410. var err error
  411. if client, err = c.GetConfigInfo(); err != nil {
  412. fail = true
  413. c.WriteAddFail()
  414. break loop
  415. } else {
  416. if err = file.GetDb().NewClient(client); err != nil {
  417. fail = true
  418. c.WriteAddFail()
  419. break loop
  420. }
  421. c.WriteAddOk()
  422. c.Write([]byte(client.VerifyKey))
  423. s.Client.Store(client.Id, NewClient(nil, nil, nil, ""))
  424. }
  425. case common.NEW_HOST:
  426. h, err := c.GetHostInfo()
  427. if err != nil {
  428. fail = true
  429. c.WriteAddFail()
  430. break loop
  431. }
  432. h.Client = client
  433. if h.Location == "" {
  434. h.Location = "/"
  435. }
  436. if !client.HasHost(h) {
  437. if file.GetDb().IsHostExist(h) {
  438. fail = true
  439. c.WriteAddFail()
  440. break loop
  441. } else {
  442. file.GetDb().NewHost(h)
  443. c.WriteAddOk()
  444. }
  445. } else {
  446. c.WriteAddOk()
  447. }
  448. case common.NEW_TASK:
  449. if t, err := c.GetTaskInfo(); err != nil {
  450. fail = true
  451. c.WriteAddFail()
  452. break loop
  453. } else {
  454. ports := common.GetPorts(t.Ports)
  455. targets := common.GetPorts(t.Target.TargetStr)
  456. if len(ports) > 1 && (t.Mode == "tcp" || t.Mode == "udp") && (len(ports) != len(targets)) {
  457. fail = true
  458. c.WriteAddFail()
  459. break loop
  460. } else if t.Mode == "secret" || t.Mode == "p2p" {
  461. ports = append(ports, 0)
  462. }
  463. if len(ports) == 0 {
  464. fail = true
  465. c.WriteAddFail()
  466. break loop
  467. }
  468. for i := 0; i < len(ports); i++ {
  469. tl := new(file.Tunnel)
  470. tl.Mode = t.Mode
  471. tl.Port = ports[i]
  472. tl.ServerIp = t.ServerIp
  473. if len(ports) == 1 {
  474. tl.Target = t.Target
  475. tl.Remark = t.Remark
  476. } else {
  477. tl.Remark = t.Remark + "_" + strconv.Itoa(tl.Port)
  478. tl.Target = new(file.Target)
  479. if t.TargetAddr != "" {
  480. tl.Target.TargetStr = t.TargetAddr + ":" + strconv.Itoa(targets[i])
  481. } else {
  482. tl.Target.TargetStr = strconv.Itoa(targets[i])
  483. }
  484. }
  485. tl.Id = int(file.GetDb().JsonDb.GetTaskId())
  486. tl.Status = true
  487. tl.Flow = new(file.Flow)
  488. tl.NoStore = true
  489. tl.Client = client
  490. tl.Password = t.Password
  491. tl.LocalPath = t.LocalPath
  492. tl.StripPre = t.StripPre
  493. tl.MultiAccount = t.MultiAccount
  494. if !client.HasTunnel(tl) {
  495. if err := file.GetDb().NewTask(tl); err != nil {
  496. logs.Notice("Add task error ", err.Error())
  497. fail = true
  498. c.WriteAddFail()
  499. break loop
  500. }
  501. if b := tool.TestServerPort(tl.Port, tl.Mode); !b && t.Mode != "secret" && t.Mode != "p2p" {
  502. fail = true
  503. c.WriteAddFail()
  504. break loop
  505. } else {
  506. s.OpenTask <- tl
  507. }
  508. }
  509. c.WriteAddOk()
  510. }
  511. }
  512. }
  513. }
  514. if fail && client != nil {
  515. s.DelClient(client.Id)
  516. }
  517. c.Close()
  518. }