bridge.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527
  1. package bridge
  2. import (
  3. "encoding/binary"
  4. "errors"
  5. "fmt"
  6. "net"
  7. "os"
  8. "strconv"
  9. "strings"
  10. "sync"
  11. "time"
  12. "github.com/astaxie/beego"
  13. "github.com/astaxie/beego/logs"
  14. "github.com/cnlh/nps/lib/common"
  15. "github.com/cnlh/nps/lib/conn"
  16. "github.com/cnlh/nps/lib/crypt"
  17. "github.com/cnlh/nps/lib/file"
  18. "github.com/cnlh/nps/lib/mux"
  19. "github.com/cnlh/nps/lib/version"
  20. "github.com/cnlh/nps/server/connection"
  21. "github.com/cnlh/nps/server/tool"
  22. )
  23. type Client struct {
  24. tunnel *mux.Mux
  25. signal *conn.Conn
  26. file *mux.Mux
  27. Version string
  28. retryTime int // it will be add 1 when ping not ok until to 3 will close the client
  29. }
  30. func NewClient(t, f *mux.Mux, s *conn.Conn, vs string) *Client {
  31. return &Client{
  32. signal: s,
  33. tunnel: t,
  34. file: f,
  35. Version: vs,
  36. }
  37. }
  38. type Bridge struct {
  39. TunnelPort int //通信隧道端口
  40. Client sync.Map
  41. Register sync.Map
  42. tunnelType string //bridge type kcp or tcp
  43. OpenTask chan *file.Tunnel
  44. CloseTask chan *file.Tunnel
  45. CloseClient chan int
  46. SecretChan chan *conn.Secret
  47. ipVerify bool
  48. runList map[int]interface{}
  49. }
  50. func NewTunnel(tunnelPort int, tunnelType string, ipVerify bool, runList map[int]interface{}) *Bridge {
  51. return &Bridge{
  52. TunnelPort: tunnelPort,
  53. tunnelType: tunnelType,
  54. OpenTask: make(chan *file.Tunnel),
  55. CloseTask: make(chan *file.Tunnel),
  56. CloseClient: make(chan int),
  57. SecretChan: make(chan *conn.Secret),
  58. ipVerify: ipVerify,
  59. runList: runList,
  60. }
  61. }
  62. func (s *Bridge) StartTunnel() error {
  63. go s.ping()
  64. if s.tunnelType == "kcp" {
  65. logs.Info("server start, the bridge type is %s, the bridge port is %d", s.tunnelType, s.TunnelPort)
  66. return conn.NewKcpListenerAndProcess(beego.AppConfig.String("bridge_ip")+":"+beego.AppConfig.String("bridge_port"), func(c net.Conn) {
  67. s.cliProcess(conn.NewConn(c))
  68. })
  69. } else {
  70. listener, err := connection.GetBridgeListener(s.tunnelType)
  71. if err != nil {
  72. logs.Error(err)
  73. os.Exit(0)
  74. return err
  75. }
  76. conn.Accept(listener, func(c net.Conn) {
  77. s.cliProcess(conn.NewConn(c))
  78. })
  79. }
  80. return nil
  81. }
  82. //get health information form client
  83. func (s *Bridge) GetHealthFromClient(id int, c *conn.Conn) {
  84. for {
  85. if info, status, err := c.GetHealthInfo(); err != nil {
  86. break
  87. } else if !status { //the status is true , return target to the targetArr
  88. file.GetDb().JsonDb.Tasks.Range(func(key, value interface{}) bool {
  89. v := value.(*file.Tunnel)
  90. if v.Client.Id == id && v.Mode == "tcp" && strings.Contains(v.Target.TargetStr, info) {
  91. v.Lock()
  92. if v.Target.TargetArr == nil || (len(v.Target.TargetArr) == 0 && len(v.HealthRemoveArr) == 0) {
  93. v.Target.TargetArr = common.TrimArr(strings.Split(v.Target.TargetStr, "\n"))
  94. }
  95. v.Target.TargetArr = common.RemoveArrVal(v.Target.TargetArr, info)
  96. if v.HealthRemoveArr == nil {
  97. v.HealthRemoveArr = make([]string, 0)
  98. }
  99. v.HealthRemoveArr = append(v.HealthRemoveArr, info)
  100. v.Unlock()
  101. }
  102. return true
  103. })
  104. file.GetDb().JsonDb.Hosts.Range(func(key, value interface{}) bool {
  105. v := value.(*file.Host)
  106. if v.Client.Id == id && strings.Contains(v.Target.TargetStr, info) {
  107. v.Lock()
  108. if v.Target.TargetArr == nil || (len(v.Target.TargetArr) == 0 && len(v.HealthRemoveArr) == 0) {
  109. v.Target.TargetArr = common.TrimArr(strings.Split(v.Target.TargetStr, "\n"))
  110. }
  111. v.Target.TargetArr = common.RemoveArrVal(v.Target.TargetArr, info)
  112. if v.HealthRemoveArr == nil {
  113. v.HealthRemoveArr = make([]string, 0)
  114. }
  115. v.HealthRemoveArr = append(v.HealthRemoveArr, info)
  116. v.Unlock()
  117. }
  118. return true
  119. })
  120. } else { //the status is false,remove target from the targetArr
  121. file.GetDb().JsonDb.Tasks.Range(func(key, value interface{}) bool {
  122. v := value.(*file.Tunnel)
  123. if v.Client.Id == id && v.Mode == "tcp" && common.IsArrContains(v.HealthRemoveArr, info) && !common.IsArrContains(v.Target.TargetArr, info) {
  124. v.Lock()
  125. v.Target.TargetArr = append(v.Target.TargetArr, info)
  126. v.HealthRemoveArr = common.RemoveArrVal(v.HealthRemoveArr, info)
  127. v.Unlock()
  128. }
  129. return true
  130. })
  131. file.GetDb().JsonDb.Hosts.Range(func(key, value interface{}) bool {
  132. v := value.(*file.Host)
  133. if v.Client.Id == id && common.IsArrContains(v.HealthRemoveArr, info) && !common.IsArrContains(v.Target.TargetArr, info) {
  134. v.Lock()
  135. v.Target.TargetArr = append(v.Target.TargetArr, info)
  136. v.HealthRemoveArr = common.RemoveArrVal(v.HealthRemoveArr, info)
  137. v.Unlock()
  138. }
  139. return true
  140. })
  141. }
  142. }
  143. s.DelClient(id)
  144. }
  145. //验证失败,返回错误验证flag,并且关闭连接
  146. func (s *Bridge) verifyError(c *conn.Conn) {
  147. c.Write([]byte(common.VERIFY_EER))
  148. }
  149. func (s *Bridge) verifySuccess(c *conn.Conn) {
  150. c.Write([]byte(common.VERIFY_SUCCESS))
  151. }
  152. func (s *Bridge) cliProcess(c *conn.Conn) {
  153. //read test flag
  154. if _, err := c.GetShortContent(3); err != nil {
  155. logs.Info("The client %s connect error", c.Conn.RemoteAddr(), err.Error())
  156. return
  157. }
  158. //version check
  159. if b, err := c.GetShortLenContent(); err != nil || string(b) != version.GetVersion() {
  160. logs.Info("The client %s version does not match", c.Conn.RemoteAddr())
  161. c.Close()
  162. return
  163. }
  164. //version get
  165. var vs []byte
  166. var err error
  167. if vs, err = c.GetShortLenContent(); err != nil {
  168. logs.Info("get client %s version error", err.Error())
  169. c.Close()
  170. return
  171. }
  172. //write server version to client
  173. c.Write([]byte(crypt.Md5(version.GetVersion())))
  174. c.SetReadDeadlineBySecond(5)
  175. var buf []byte
  176. //get vKey from client
  177. if buf, err = c.GetShortContent(32); err != nil {
  178. c.Close()
  179. return
  180. }
  181. //verify
  182. id, err := file.GetDb().GetIdByVerifyKey(string(buf), c.Conn.RemoteAddr().String())
  183. if err != nil {
  184. logs.Info("Current client connection validation error, close this client:", c.Conn.RemoteAddr())
  185. s.verifyError(c)
  186. return
  187. } else {
  188. s.verifySuccess(c)
  189. }
  190. if flag, err := c.ReadFlag(); err == nil {
  191. s.typeDeal(flag, c, id, string(vs))
  192. } else {
  193. logs.Warn(err, flag)
  194. }
  195. return
  196. }
  197. func (s *Bridge) DelClient(id int) {
  198. if v, ok := s.Client.Load(id); ok {
  199. if v.(*Client).signal != nil {
  200. v.(*Client).signal.Close()
  201. }
  202. s.Client.Delete(id)
  203. if file.GetDb().IsPubClient(id) {
  204. return
  205. }
  206. if c, err := file.GetDb().GetClient(id); err == nil {
  207. s.CloseClient <- c.Id
  208. }
  209. }
  210. }
  211. //use different
  212. func (s *Bridge) typeDeal(typeVal string, c *conn.Conn, id int, vs string) {
  213. isPub := file.GetDb().IsPubClient(id)
  214. switch typeVal {
  215. case common.WORK_MAIN:
  216. if isPub {
  217. c.Close()
  218. return
  219. }
  220. //the vKey connect by another ,close the client of before
  221. if v, ok := s.Client.LoadOrStore(id, NewClient(nil, nil, c, vs)); ok {
  222. if v.(*Client).signal != nil {
  223. v.(*Client).signal.WriteClose()
  224. }
  225. v.(*Client).signal = c
  226. v.(*Client).Version = vs
  227. }
  228. go s.GetHealthFromClient(id, c)
  229. logs.Info("clientId %d connection succeeded, address:%s ", id, c.Conn.RemoteAddr())
  230. case common.WORK_CHAN:
  231. muxConn := mux.NewMux(c.Conn, s.tunnelType)
  232. if v, ok := s.Client.LoadOrStore(id, NewClient(muxConn, nil, nil, vs)); ok {
  233. v.(*Client).tunnel = muxConn
  234. }
  235. case common.WORK_CONFIG:
  236. client, err := file.GetDb().GetClient(id)
  237. if err != nil || (!isPub && !client.ConfigConnAllow) {
  238. c.Close()
  239. return
  240. }
  241. binary.Write(c, binary.LittleEndian, isPub)
  242. go s.getConfig(c, isPub, client)
  243. case common.WORK_REGISTER:
  244. go s.register(c)
  245. case common.WORK_SECRET:
  246. if b, err := c.GetShortContent(32); err == nil {
  247. s.SecretChan <- conn.NewSecret(string(b), c)
  248. } else {
  249. logs.Error("secret error, failed to match the key successfully")
  250. }
  251. case common.WORK_FILE:
  252. muxConn := mux.NewMux(c.Conn, s.tunnelType)
  253. if v, ok := s.Client.LoadOrStore(id, NewClient(nil, muxConn, nil, vs)); ok {
  254. v.(*Client).file = muxConn
  255. }
  256. case common.WORK_P2P:
  257. //read md5 secret
  258. if b, err := c.GetShortContent(32); err != nil {
  259. logs.Error("p2p error,", err.Error())
  260. } else if t := file.GetDb().GetTaskByMd5Password(string(b)); t == nil {
  261. logs.Error("p2p error, failed to match the key successfully")
  262. } else {
  263. if v, ok := s.Client.Load(t.Client.Id); !ok {
  264. return
  265. } else {
  266. //向密钥对应的客户端发送与服务端udp建立连接信息,地址,密钥
  267. v.(*Client).signal.Write([]byte(common.NEW_UDP_CONN))
  268. svrAddr := beego.AppConfig.String("p2p_ip") + ":" + beego.AppConfig.String("p2p_port")
  269. if err != nil {
  270. logs.Warn("get local udp addr error")
  271. return
  272. }
  273. v.(*Client).signal.WriteLenContent([]byte(svrAddr))
  274. v.(*Client).signal.WriteLenContent(b)
  275. //向该请求者发送建立连接请求,服务器地址
  276. c.WriteLenContent([]byte(svrAddr))
  277. }
  278. }
  279. }
  280. c.SetAlive(s.tunnelType)
  281. return
  282. }
  283. //register ip
  284. func (s *Bridge) register(c *conn.Conn) {
  285. var hour int32
  286. if err := binary.Read(c, binary.LittleEndian, &hour); err == nil {
  287. s.Register.Store(common.GetIpByAddr(c.Conn.RemoteAddr().String()), time.Now().Add(time.Hour*time.Duration(hour)))
  288. }
  289. }
  290. func (s *Bridge) SendLinkInfo(clientId int, link *conn.Link, t *file.Tunnel) (target net.Conn, err error) {
  291. //if the proxy type is local
  292. if link.LocalProxy {
  293. target, err = net.Dial("tcp", link.Host)
  294. return
  295. }
  296. if v, ok := s.Client.Load(clientId); ok {
  297. //If ip is restricted to do ip verification
  298. if s.ipVerify {
  299. ip := common.GetIpByAddr(link.RemoteAddr)
  300. if v, ok := s.Register.Load(ip); !ok {
  301. return nil, errors.New(fmt.Sprintf("The ip %s is not in the validation list", ip))
  302. } else {
  303. if !v.(time.Time).After(time.Now()) {
  304. return nil, errors.New(fmt.Sprintf("The validity of the ip %s has expired", ip))
  305. }
  306. }
  307. }
  308. var tunnel *mux.Mux
  309. if t != nil && t.Mode == "file" {
  310. tunnel = v.(*Client).file
  311. } else {
  312. tunnel = v.(*Client).tunnel
  313. }
  314. if tunnel == nil {
  315. err = errors.New("the client connect error")
  316. return
  317. }
  318. if target, err = tunnel.NewConn(); err != nil {
  319. return
  320. }
  321. if t != nil && t.Mode == "file" {
  322. //TODO if t.mode is file ,not use crypt or compress
  323. link.Crypt = false
  324. link.Compress = false
  325. return
  326. }
  327. if _, err = conn.NewConn(target).SendInfo(link, ""); err != nil {
  328. logs.Info("new connect error ,the target %s refuse to connect", link.Host)
  329. return
  330. }
  331. } else {
  332. err = errors.New(fmt.Sprintf("the client %d is not connect", clientId))
  333. }
  334. return
  335. }
  336. func (s *Bridge) ping() {
  337. ticker := time.NewTicker(time.Second * 5)
  338. defer ticker.Stop()
  339. for {
  340. select {
  341. case <-ticker.C:
  342. arr := make([]int, 0)
  343. s.Client.Range(func(key, value interface{}) bool {
  344. v := value.(*Client)
  345. if v.tunnel == nil || v.signal == nil {
  346. v.retryTime += 1
  347. if v.retryTime >= 3 {
  348. arr = append(arr, key.(int))
  349. }
  350. return true
  351. }
  352. if v.tunnel.IsClose {
  353. arr = append(arr, key.(int))
  354. }
  355. return true
  356. })
  357. for _, v := range arr {
  358. logs.Info("the client %d closed", v)
  359. s.DelClient(v)
  360. }
  361. }
  362. }
  363. }
  364. //get config and add task from client config
  365. func (s *Bridge) getConfig(c *conn.Conn, isPub bool, client *file.Client) {
  366. var fail bool
  367. loop:
  368. for {
  369. flag, err := c.ReadFlag()
  370. if err != nil {
  371. break
  372. }
  373. switch flag {
  374. case common.WORK_STATUS:
  375. if b, err := c.GetShortContent(32); err != nil {
  376. break loop
  377. } else {
  378. var str string
  379. id, err := file.GetDb().GetClientIdByVkey(string(b))
  380. if err != nil {
  381. break loop
  382. }
  383. file.GetDb().JsonDb.Hosts.Range(func(key, value interface{}) bool {
  384. v := value.(*file.Host)
  385. if v.Client.Id == id {
  386. str += v.Remark + common.CONN_DATA_SEQ
  387. }
  388. return true
  389. })
  390. file.GetDb().JsonDb.Tasks.Range(func(key, value interface{}) bool {
  391. v := value.(*file.Tunnel)
  392. if _, ok := s.runList[v.Id]; ok && v.Client.Id == id {
  393. str += v.Remark + common.CONN_DATA_SEQ
  394. }
  395. return true
  396. })
  397. binary.Write(c, binary.LittleEndian, int32(len([]byte(str))))
  398. binary.Write(c, binary.LittleEndian, []byte(str))
  399. }
  400. case common.NEW_CONF:
  401. var err error
  402. if client, err = c.GetConfigInfo(); err != nil {
  403. fail = true
  404. c.WriteAddFail()
  405. break loop
  406. } else {
  407. if err = file.GetDb().NewClient(client); err != nil {
  408. fail = true
  409. c.WriteAddFail()
  410. break loop
  411. }
  412. c.WriteAddOk()
  413. c.Write([]byte(client.VerifyKey))
  414. s.Client.Store(client.Id, NewClient(nil, nil, nil, ""))
  415. }
  416. case common.NEW_HOST:
  417. h, err := c.GetHostInfo()
  418. if err != nil {
  419. fail = true
  420. c.WriteAddFail()
  421. break loop
  422. }
  423. h.Client = client
  424. if h.Location == "" {
  425. h.Location = "/"
  426. }
  427. if !client.HasHost(h) {
  428. if file.GetDb().IsHostExist(h) {
  429. fail = true
  430. c.WriteAddFail()
  431. break loop
  432. } else {
  433. file.GetDb().NewHost(h)
  434. c.WriteAddOk()
  435. }
  436. } else {
  437. c.WriteAddOk()
  438. }
  439. case common.NEW_TASK:
  440. if t, err := c.GetTaskInfo(); err != nil {
  441. fail = true
  442. c.WriteAddFail()
  443. break loop
  444. } else {
  445. ports := common.GetPorts(t.Ports)
  446. targets := common.GetPorts(t.Target.TargetStr)
  447. if len(ports) > 1 && (t.Mode == "tcp" || t.Mode == "udp") && (len(ports) != len(targets)) {
  448. fail = true
  449. c.WriteAddFail()
  450. break loop
  451. } else if t.Mode == "secret" || t.Mode == "p2p" {
  452. ports = append(ports, 0)
  453. }
  454. if len(ports) == 0 {
  455. fail = true
  456. c.WriteAddFail()
  457. break loop
  458. }
  459. for i := 0; i < len(ports); i++ {
  460. tl := new(file.Tunnel)
  461. tl.Mode = t.Mode
  462. tl.Port = ports[i]
  463. tl.ServerIp = t.ServerIp
  464. if len(ports) == 1 {
  465. tl.Target = t.Target
  466. tl.Remark = t.Remark
  467. } else {
  468. tl.Remark = t.Remark + "_" + strconv.Itoa(tl.Port)
  469. tl.Target = new(file.Target)
  470. if t.TargetAddr != "" {
  471. tl.Target.TargetStr = t.TargetAddr + ":" + strconv.Itoa(targets[i])
  472. } else {
  473. tl.Target.TargetStr = strconv.Itoa(targets[i])
  474. }
  475. }
  476. tl.Id = int(file.GetDb().JsonDb.GetTaskId())
  477. tl.Status = true
  478. tl.Flow = new(file.Flow)
  479. tl.NoStore = true
  480. tl.Client = client
  481. tl.Password = t.Password
  482. tl.LocalPath = t.LocalPath
  483. tl.StripPre = t.StripPre
  484. tl.MultiAccount = t.MultiAccount
  485. if !client.HasTunnel(tl) {
  486. if err := file.GetDb().NewTask(tl); err != nil {
  487. logs.Notice("Add task error ", err.Error())
  488. fail = true
  489. c.WriteAddFail()
  490. break loop
  491. }
  492. if b := tool.TestServerPort(tl.Port, tl.Mode); !b && t.Mode != "secret" && t.Mode != "p2p" {
  493. fail = true
  494. c.WriteAddFail()
  495. break loop
  496. } else {
  497. s.OpenTask <- tl
  498. }
  499. }
  500. c.WriteAddOk()
  501. }
  502. }
  503. }
  504. }
  505. if fail && client != nil {
  506. s.DelClient(client.Id)
  507. }
  508. c.Close()
  509. }