2019-06-17 21:18:47 +00:00
|
|
|
package connection
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"crypto/tls"
|
|
|
|
"fmt"
|
|
|
|
"net"
|
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/cloudflare/cloudflared/cmd/cloudflared/buildinfo"
|
|
|
|
"github.com/cloudflare/cloudflared/h2mux"
|
|
|
|
"github.com/cloudflare/cloudflared/tunnelrpc/pogs"
|
|
|
|
"github.com/google/uuid"
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
"github.com/sirupsen/logrus"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
quickStartLink = "https://developers.cloudflare.com/argo-tunnel/quickstart/"
|
|
|
|
faqLink = "https://developers.cloudflare.com/argo-tunnel/faq/"
|
|
|
|
)
|
|
|
|
|
|
|
|
// EdgeManager manages connections with the edge
|
|
|
|
type EdgeManager struct {
|
|
|
|
// streamHandler handles stream opened by the edge
|
|
|
|
streamHandler h2mux.MuxedStreamHandler
|
|
|
|
// TLSConfig is the TLS configuration to connect with edge
|
|
|
|
tlsConfig *tls.Config
|
|
|
|
// cloudflaredConfig is the cloudflared configuration that is determined when the process first starts
|
|
|
|
cloudflaredConfig *CloudflaredConfig
|
|
|
|
// serviceDiscoverer returns the next edge addr to connect to
|
|
|
|
serviceDiscoverer EdgeServiceDiscoverer
|
|
|
|
// state is attributes of ConnectionManager that can change during runtime.
|
|
|
|
state *edgeManagerState
|
|
|
|
|
|
|
|
logger *logrus.Entry
|
|
|
|
}
|
|
|
|
|
|
|
|
// EdgeConnectionManagerConfigurable is the configurable attributes of a EdgeConnectionManager
|
|
|
|
type EdgeManagerConfigurable struct {
|
|
|
|
TunnelHostnames []h2mux.TunnelHostname
|
|
|
|
*pogs.EdgeConnectionConfig
|
|
|
|
}
|
|
|
|
|
|
|
|
type CloudflaredConfig struct {
|
|
|
|
CloudflaredID uuid.UUID
|
|
|
|
Tags []pogs.Tag
|
|
|
|
BuildInfo *buildinfo.BuildInfo
|
2019-07-30 18:55:34 +00:00
|
|
|
Scope pogs.Scope
|
2019-06-17 21:18:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func NewEdgeManager(
|
|
|
|
streamHandler h2mux.MuxedStreamHandler,
|
|
|
|
edgeConnMgrConfigurable *EdgeManagerConfigurable,
|
|
|
|
userCredential []byte,
|
|
|
|
tlsConfig *tls.Config,
|
|
|
|
serviceDiscoverer EdgeServiceDiscoverer,
|
|
|
|
cloudflaredConfig *CloudflaredConfig,
|
|
|
|
logger *logrus.Logger,
|
|
|
|
) *EdgeManager {
|
|
|
|
return &EdgeManager{
|
|
|
|
streamHandler: streamHandler,
|
|
|
|
tlsConfig: tlsConfig,
|
|
|
|
cloudflaredConfig: cloudflaredConfig,
|
|
|
|
serviceDiscoverer: serviceDiscoverer,
|
|
|
|
state: newEdgeConnectionManagerState(edgeConnMgrConfigurable, userCredential),
|
|
|
|
logger: logger.WithField("subsystem", "connectionManager"),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (em *EdgeManager) Run(ctx context.Context) error {
|
|
|
|
defer em.shutdown()
|
|
|
|
|
|
|
|
resolveEdgeIPTicker := time.Tick(resolveEdgeAddrTTL)
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
return errors.Wrap(ctx.Err(), "EdgeConnectionManager terminated")
|
|
|
|
case <-resolveEdgeIPTicker:
|
|
|
|
if err := em.serviceDiscoverer.Refresh(); err != nil {
|
|
|
|
em.logger.WithError(err).Warn("Cannot refresh Cloudflare edge addresses")
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
time.Sleep(1 * time.Second)
|
|
|
|
}
|
|
|
|
// Create/delete connection one at a time, so we don't need to adjust for connections that are being created/deleted
|
|
|
|
// in shouldCreateConnection or shouldReduceConnection calculation
|
|
|
|
if em.state.shouldCreateConnection(em.serviceDiscoverer.AvailableAddrs()) {
|
|
|
|
if err := em.newConnection(ctx); err != nil {
|
|
|
|
em.logger.WithError(err).Error("cannot create new connection")
|
|
|
|
}
|
|
|
|
} else if em.state.shouldReduceConnection() {
|
|
|
|
if err := em.closeConnection(ctx); err != nil {
|
|
|
|
em.logger.WithError(err).Error("cannot close connection")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (em *EdgeManager) UpdateConfigurable(newConfigurable *EdgeManagerConfigurable) {
|
|
|
|
em.logger.Infof("New edge connection manager configuration %+v", newConfigurable)
|
|
|
|
em.state.updateConfigurable(newConfigurable)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (em *EdgeManager) newConnection(ctx context.Context) error {
|
|
|
|
edgeIP := em.serviceDiscoverer.Addr()
|
|
|
|
edgeConn, err := em.dialEdge(ctx, edgeIP)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "dial edge error")
|
|
|
|
}
|
|
|
|
configurable := em.state.getConfigurable()
|
|
|
|
// Establish a muxed connection with the edge
|
|
|
|
// Client mux handshake with agent server
|
|
|
|
muxer, err := h2mux.Handshake(edgeConn, edgeConn, h2mux.MuxerConfig{
|
|
|
|
Timeout: configurable.Timeout,
|
|
|
|
Handler: em.streamHandler,
|
|
|
|
IsClient: true,
|
|
|
|
HeartbeatInterval: configurable.HeartbeatInterval,
|
|
|
|
MaxHeartbeats: configurable.MaxFailedHeartbeats,
|
|
|
|
Logger: em.logger.WithField("subsystem", "muxer"),
|
|
|
|
})
|
|
|
|
if err != nil {
|
2019-07-30 18:55:34 +00:00
|
|
|
return errors.Wrap(err, "couldn't perform handshake with edge")
|
2019-06-17 21:18:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
h2muxConn, err := newConnection(muxer, edgeIP)
|
|
|
|
if err != nil {
|
2019-07-30 18:55:34 +00:00
|
|
|
return errors.Wrap(err, "couldn't create h2mux connection")
|
2019-06-17 21:18:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
go em.serveConn(ctx, h2muxConn)
|
|
|
|
|
|
|
|
connResult, err := h2muxConn.Connect(ctx, &pogs.ConnectParameters{
|
|
|
|
CloudflaredID: em.cloudflaredConfig.CloudflaredID,
|
|
|
|
CloudflaredVersion: em.cloudflaredConfig.BuildInfo.CloudflaredVersion,
|
2019-07-30 18:55:34 +00:00
|
|
|
NumPreviousAttempts: 0,
|
|
|
|
OriginCert: em.state.getUserCredential(),
|
|
|
|
Scope: em.cloudflaredConfig.Scope,
|
|
|
|
Tags: em.cloudflaredConfig.Tags,
|
2019-06-17 21:18:47 +00:00
|
|
|
}, em.logger)
|
|
|
|
if err != nil {
|
|
|
|
h2muxConn.Shutdown()
|
2019-07-30 18:55:34 +00:00
|
|
|
return errors.Wrap(err, "couldn't connect to edge")
|
2019-06-17 21:18:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if connErr := connResult.Err; connErr != nil {
|
|
|
|
if !connErr.ShouldRetry {
|
|
|
|
return errors.Wrap(connErr, em.noRetryMessage())
|
|
|
|
}
|
2019-07-30 18:55:34 +00:00
|
|
|
return errors.Wrapf(connErr, "edge responded with RetryAfter=%v", connErr.RetryAfter)
|
2019-06-17 21:18:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
em.state.newConnection(h2muxConn)
|
|
|
|
em.logger.Infof("connected to %s", connResult.ServerInfo.LocationName)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (em *EdgeManager) closeConnection(ctx context.Context) error {
|
|
|
|
conn := em.state.getFirstConnection()
|
|
|
|
if conn == nil {
|
|
|
|
return fmt.Errorf("no connection to close")
|
|
|
|
}
|
|
|
|
conn.Shutdown()
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (em *EdgeManager) serveConn(ctx context.Context, conn *Connection) {
|
|
|
|
err := conn.Serve(ctx)
|
|
|
|
em.logger.WithError(err).Warn("Connection closed")
|
|
|
|
em.state.closeConnection(conn)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (em *EdgeManager) dialEdge(ctx context.Context, edgeIP *net.TCPAddr) (*tls.Conn, error) {
|
|
|
|
timeout := em.state.getConfigurable().Timeout
|
|
|
|
// Inherit from parent context so we can cancel (Ctrl-C) while dialing
|
|
|
|
dialCtx, dialCancel := context.WithTimeout(ctx, timeout)
|
|
|
|
defer dialCancel()
|
|
|
|
|
|
|
|
dialer := net.Dialer{DualStack: true}
|
|
|
|
edgeConn, err := dialer.DialContext(dialCtx, "tcp", edgeIP.String())
|
|
|
|
if err != nil {
|
|
|
|
return nil, dialError{cause: errors.Wrap(err, "DialContext error")}
|
|
|
|
}
|
|
|
|
tlsEdgeConn := tls.Client(edgeConn, em.tlsConfig)
|
|
|
|
tlsEdgeConn.SetDeadline(time.Now().Add(timeout))
|
|
|
|
|
|
|
|
if err = tlsEdgeConn.Handshake(); err != nil {
|
|
|
|
return nil, dialError{cause: errors.Wrap(err, "Handshake with edge error")}
|
|
|
|
}
|
|
|
|
// clear the deadline on the conn; h2mux has its own timeouts
|
|
|
|
tlsEdgeConn.SetDeadline(time.Time{})
|
|
|
|
return tlsEdgeConn, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (em *EdgeManager) noRetryMessage() string {
|
|
|
|
messageTemplate := "cloudflared could not register an Argo Tunnel on your account. Please confirm the following before trying again:" +
|
|
|
|
"1. You have Argo Smart Routing enabled in your account, See Enable Argo section of %s." +
|
|
|
|
"2. Your credential at %s is still valid. See %s."
|
|
|
|
return fmt.Sprintf(messageTemplate, quickStartLink, em.state.getConfigurable().UserCredentialPath, faqLink)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (em *EdgeManager) shutdown() {
|
|
|
|
em.state.shutdown()
|
|
|
|
}
|
|
|
|
|
|
|
|
type edgeManagerState struct {
|
|
|
|
sync.RWMutex
|
|
|
|
configurable *EdgeManagerConfigurable
|
|
|
|
userCredential []byte
|
|
|
|
conns map[uuid.UUID]*Connection
|
|
|
|
}
|
|
|
|
|
|
|
|
func newEdgeConnectionManagerState(configurable *EdgeManagerConfigurable, userCredential []byte) *edgeManagerState {
|
|
|
|
return &edgeManagerState{
|
|
|
|
configurable: configurable,
|
|
|
|
userCredential: userCredential,
|
|
|
|
conns: make(map[uuid.UUID]*Connection),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ems *edgeManagerState) shouldCreateConnection(availableEdgeAddrs uint8) bool {
|
|
|
|
ems.RLock()
|
|
|
|
defer ems.RUnlock()
|
|
|
|
expectedHAConns := ems.configurable.NumHAConnections
|
|
|
|
if availableEdgeAddrs < expectedHAConns {
|
|
|
|
expectedHAConns = availableEdgeAddrs
|
|
|
|
}
|
|
|
|
return uint8(len(ems.conns)) < expectedHAConns
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ems *edgeManagerState) shouldReduceConnection() bool {
|
|
|
|
ems.RLock()
|
|
|
|
defer ems.RUnlock()
|
|
|
|
return uint8(len(ems.conns)) > ems.configurable.NumHAConnections
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ems *edgeManagerState) newConnection(conn *Connection) {
|
|
|
|
ems.Lock()
|
|
|
|
defer ems.Unlock()
|
|
|
|
ems.conns[conn.id] = conn
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ems *edgeManagerState) closeConnection(conn *Connection) {
|
|
|
|
ems.Lock()
|
|
|
|
defer ems.Unlock()
|
|
|
|
delete(ems.conns, conn.id)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ems *edgeManagerState) getFirstConnection() *Connection {
|
|
|
|
ems.RLock()
|
|
|
|
defer ems.RUnlock()
|
|
|
|
|
|
|
|
for _, conn := range ems.conns {
|
|
|
|
return conn
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ems *edgeManagerState) shutdown() {
|
|
|
|
ems.Lock()
|
|
|
|
defer ems.Unlock()
|
|
|
|
for _, conn := range ems.conns {
|
|
|
|
conn.Shutdown()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ems *edgeManagerState) getConfigurable() *EdgeManagerConfigurable {
|
|
|
|
ems.Lock()
|
|
|
|
defer ems.Unlock()
|
|
|
|
return ems.configurable
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ems *edgeManagerState) updateConfigurable(newConfigurable *EdgeManagerConfigurable) {
|
|
|
|
ems.Lock()
|
|
|
|
defer ems.Unlock()
|
|
|
|
ems.configurable = newConfigurable
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ems *edgeManagerState) getUserCredential() []byte {
|
|
|
|
ems.RLock()
|
|
|
|
defer ems.RUnlock()
|
|
|
|
return ems.userCredential
|
|
|
|
}
|