local.go 6.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219
  1. package client
  2. import (
  3. "ehang.io/nps-mux"
  4. "errors"
  5. "net"
  6. "net/http"
  7. "runtime"
  8. "sync"
  9. "time"
  10. "ehang.io/nps/lib/common"
  11. "ehang.io/nps/lib/config"
  12. "ehang.io/nps/lib/conn"
  13. "ehang.io/nps/lib/crypt"
  14. "ehang.io/nps/lib/file"
  15. "ehang.io/nps/server/proxy"
  16. "github.com/astaxie/beego/logs"
  17. "github.com/xtaci/kcp-go"
  18. )
  19. var (
  20. LocalServer []*net.TCPListener
  21. udpConn net.Conn
  22. muxSession *nps_mux.Mux
  23. fileServer []*http.Server
  24. p2pNetBridge *p2pBridge
  25. lock sync.RWMutex
  26. udpConnStatus bool
  27. )
  28. type p2pBridge struct {
  29. }
  30. func (p2pBridge *p2pBridge) SendLinkInfo(clientId int, link *conn.Link, t *file.Tunnel) (target net.Conn, err error) {
  31. for i := 0; muxSession == nil; i++ {
  32. if i >= 20 {
  33. err = errors.New("p2pBridge:too many times to get muxSession")
  34. logs.Error(err)
  35. return
  36. }
  37. runtime.Gosched() // waiting for another goroutine establish the mux connection
  38. }
  39. nowConn, err := muxSession.NewConn()
  40. if err != nil {
  41. udpConn = nil
  42. return nil, err
  43. }
  44. if _, err := conn.NewConn(nowConn).SendInfo(link, ""); err != nil {
  45. udpConnStatus = false
  46. return nil, err
  47. }
  48. return nowConn, nil
  49. }
  50. func CloseLocalServer() {
  51. for _, v := range LocalServer {
  52. v.Close()
  53. }
  54. for _, v := range fileServer {
  55. v.Close()
  56. }
  57. }
  58. func startLocalFileServer(config *config.CommonConfig, t *file.Tunnel, vkey string) {
  59. remoteConn, err := NewConn(config.Tp, vkey, config.Server, common.WORK_FILE, config.ProxyUrl)
  60. if err != nil {
  61. logs.Error("Local connection server failed ", err.Error())
  62. return
  63. }
  64. srv := &http.Server{
  65. Handler: http.StripPrefix(t.StripPre, http.FileServer(http.Dir(t.LocalPath))),
  66. }
  67. logs.Info("start local file system, local path %s, strip prefix %s ,remote port %s ", t.LocalPath, t.StripPre, t.Ports)
  68. fileServer = append(fileServer, srv)
  69. listener := nps_mux.NewMux(remoteConn.Conn, common.CONN_TCP, config.DisconnectTime)
  70. logs.Error(srv.Serve(listener))
  71. }
  72. func StartLocalServer(l *config.LocalServer, config *config.CommonConfig) error {
  73. if l.Type != "secret" {
  74. go handleUdpMonitor(config, l)
  75. }
  76. task := &file.Tunnel{
  77. Port: l.Port,
  78. ServerIp: "0.0.0.0",
  79. Status: true,
  80. Client: &file.Client{
  81. Cnf: &file.Config{
  82. U: "",
  83. P: "",
  84. Compress: config.Client.Cnf.Compress,
  85. },
  86. Status: true,
  87. RateLimit: 0,
  88. Flow: &file.Flow{},
  89. },
  90. Flow: &file.Flow{},
  91. Target: &file.Target{},
  92. }
  93. switch l.Type {
  94. case "p2ps":
  95. logs.Info("successful start-up of local socks5 monitoring, port", l.Port)
  96. return proxy.NewSock5ModeServer(p2pNetBridge, task).Start()
  97. case "p2pt":
  98. logs.Info("successful start-up of local tcp trans monitoring, port", l.Port)
  99. return proxy.NewTunnelModeServer(proxy.HandleTrans, p2pNetBridge, task).Start()
  100. case "p2p", "secret":
  101. listener, err := net.ListenTCP("tcp", &net.TCPAddr{net.ParseIP("0.0.0.0"), l.Port, ""})
  102. if err != nil {
  103. logs.Error("local listener startup failed port %d, error %s", l.Port, err.Error())
  104. return err
  105. }
  106. LocalServer = append(LocalServer, listener)
  107. logs.Info("successful start-up of local tcp monitoring, port", l.Port)
  108. conn.Accept(listener, func(c net.Conn) {
  109. logs.Trace("new %s connection", l.Type)
  110. if l.Type == "secret" {
  111. handleSecret(c, config, l)
  112. } else if l.Type == "p2p" {
  113. handleP2PVisitor(c, config, l)
  114. }
  115. })
  116. }
  117. return nil
  118. }
  119. func handleUdpMonitor(config *config.CommonConfig, l *config.LocalServer) {
  120. ticker := time.NewTicker(time.Second * 1)
  121. defer ticker.Stop()
  122. for {
  123. select {
  124. case <-ticker.C:
  125. if !udpConnStatus {
  126. udpConn = nil
  127. tmpConn, err := common.GetLocalUdpAddr()
  128. if err != nil {
  129. logs.Error(err)
  130. return
  131. }
  132. for i := 0; i < 10; i++ {
  133. logs.Notice("try to connect to the server", i+1)
  134. newUdpConn(tmpConn.LocalAddr().String(), config, l)
  135. if udpConn != nil {
  136. udpConnStatus = true
  137. break
  138. }
  139. }
  140. }
  141. }
  142. }
  143. }
  144. func handleSecret(localTcpConn net.Conn, config *config.CommonConfig, l *config.LocalServer) {
  145. remoteConn, err := NewConn(config.Tp, config.VKey, config.Server, common.WORK_SECRET, config.ProxyUrl)
  146. if err != nil {
  147. logs.Error("Local connection server failed ", err.Error())
  148. return
  149. }
  150. if _, err := remoteConn.Write([]byte(crypt.Md5(l.Password))); err != nil {
  151. logs.Error("Local connection server failed ", err.Error())
  152. return
  153. }
  154. conn.CopyWaitGroup(remoteConn.Conn, localTcpConn, false, false, nil, nil, false, nil)
  155. }
  156. func handleP2PVisitor(localTcpConn net.Conn, config *config.CommonConfig, l *config.LocalServer) {
  157. if udpConn == nil {
  158. logs.Notice("new conn, P2P can not penetrate successfully, traffic will be transferred through the server")
  159. handleSecret(localTcpConn, config, l)
  160. return
  161. }
  162. logs.Trace("start trying to connect with the server")
  163. //TODO just support compress now because there is not tls file in client packages
  164. link := conn.NewLink(common.CONN_TCP, l.Target, false, config.Client.Cnf.Compress, localTcpConn.LocalAddr().String(), false)
  165. if target, err := p2pNetBridge.SendLinkInfo(0, link, nil); err != nil {
  166. logs.Error(err)
  167. udpConnStatus = false
  168. return
  169. } else {
  170. conn.CopyWaitGroup(target, localTcpConn, false, config.Client.Cnf.Compress, nil, nil, false, nil)
  171. }
  172. }
  173. func newUdpConn(localAddr string, config *config.CommonConfig, l *config.LocalServer) {
  174. lock.Lock()
  175. defer lock.Unlock()
  176. remoteConn, err := NewConn(config.Tp, config.VKey, config.Server, common.WORK_P2P, config.ProxyUrl)
  177. if err != nil {
  178. logs.Error("Local connection server failed ", err.Error())
  179. return
  180. }
  181. if _, err := remoteConn.Write([]byte(crypt.Md5(l.Password))); err != nil {
  182. logs.Error("Local connection server failed ", err.Error())
  183. return
  184. }
  185. var rAddr []byte
  186. //读取服务端地址、密钥 继续做处理
  187. if rAddr, err = remoteConn.GetShortLenContent(); err != nil {
  188. logs.Error(err)
  189. return
  190. }
  191. var localConn net.PacketConn
  192. var remoteAddress string
  193. if remoteAddress, localConn, err = handleP2PUdp(localAddr, string(rAddr), crypt.Md5(l.Password), common.WORK_P2P_VISITOR); err != nil {
  194. logs.Error(err)
  195. return
  196. }
  197. udpTunnel, err := kcp.NewConn(remoteAddress, nil, 150, 3, localConn)
  198. if err != nil || udpTunnel == nil {
  199. logs.Warn(err)
  200. return
  201. }
  202. logs.Trace("successful create a connection with server", remoteAddress)
  203. conn.SetUdpSession(udpTunnel)
  204. udpConn = udpTunnel
  205. muxSession = nps_mux.NewMux(udpConn, "kcp", config.DisconnectTime)
  206. p2pNetBridge = &p2pBridge{}
  207. }