h2mux.go 7.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262
  1. package connection
  2. import (
  3. "context"
  4. "io"
  5. "net"
  6. "net/http"
  7. "time"
  8. "github.com/pkg/errors"
  9. "github.com/rs/zerolog"
  10. "golang.org/x/sync/errgroup"
  11. "github.com/cloudflare/cloudflared/h2mux"
  12. tunnelpogs "github.com/cloudflare/cloudflared/tunnelrpc/pogs"
  13. "github.com/cloudflare/cloudflared/websocket"
  14. )
  15. const (
  16. muxerTimeout = 5 * time.Second
  17. openStreamTimeout = 30 * time.Second
  18. )
  19. type h2muxConnection struct {
  20. config *Config
  21. muxerConfig *MuxerConfig
  22. muxer *h2mux.Muxer
  23. // connectionID is only used by metrics, and prometheus requires labels to be string
  24. connIndexStr string
  25. connIndex uint8
  26. observer *Observer
  27. gracefulShutdownC <-chan struct{}
  28. stoppedGracefully bool
  29. // newRPCClientFunc allows us to mock RPCs during testing
  30. newRPCClientFunc func(context.Context, io.ReadWriteCloser, *zerolog.Logger) NamedTunnelRPCClient
  31. }
  32. type MuxerConfig struct {
  33. HeartbeatInterval time.Duration
  34. MaxHeartbeats uint64
  35. CompressionSetting h2mux.CompressionSetting
  36. MetricsUpdateFreq time.Duration
  37. }
  38. func (mc *MuxerConfig) H2MuxerConfig(h h2mux.MuxedStreamHandler, log *zerolog.Logger) *h2mux.MuxerConfig {
  39. return &h2mux.MuxerConfig{
  40. Timeout: muxerTimeout,
  41. Handler: h,
  42. IsClient: true,
  43. HeartbeatInterval: mc.HeartbeatInterval,
  44. MaxHeartbeats: mc.MaxHeartbeats,
  45. Log: log,
  46. CompressionQuality: mc.CompressionSetting,
  47. }
  48. }
  49. // NewTunnelHandler returns a TunnelHandler, origin LAN IP and error
  50. func NewH2muxConnection(
  51. config *Config,
  52. muxerConfig *MuxerConfig,
  53. edgeConn net.Conn,
  54. connIndex uint8,
  55. observer *Observer,
  56. gracefulShutdownC <-chan struct{},
  57. ) (*h2muxConnection, error, bool) {
  58. h := &h2muxConnection{
  59. config: config,
  60. muxerConfig: muxerConfig,
  61. connIndexStr: uint8ToString(connIndex),
  62. connIndex: connIndex,
  63. observer: observer,
  64. gracefulShutdownC: gracefulShutdownC,
  65. newRPCClientFunc: newRegistrationRPCClient,
  66. }
  67. // Establish a muxed connection with the edge
  68. // Client mux handshake with agent server
  69. muxer, err := h2mux.Handshake(edgeConn, edgeConn, *muxerConfig.H2MuxerConfig(h, observer.logTransport), h2mux.ActiveStreams)
  70. if err != nil {
  71. recoverable := isHandshakeErrRecoverable(err, connIndex, observer)
  72. return nil, err, recoverable
  73. }
  74. h.muxer = muxer
  75. return h, nil, false
  76. }
  77. func (h *h2muxConnection) ServeNamedTunnel(ctx context.Context, namedTunnel *NamedTunnelConfig, connOptions *tunnelpogs.ConnectionOptions, connectedFuse ConnectedFuse) error {
  78. errGroup, serveCtx := errgroup.WithContext(ctx)
  79. errGroup.Go(func() error {
  80. return h.serveMuxer(serveCtx)
  81. })
  82. errGroup.Go(func() error {
  83. if err := h.registerNamedTunnel(serveCtx, namedTunnel, connOptions); err != nil {
  84. return err
  85. }
  86. connectedFuse.Connected()
  87. return nil
  88. })
  89. errGroup.Go(func() error {
  90. h.controlLoop(serveCtx, connectedFuse, true)
  91. return nil
  92. })
  93. err := errGroup.Wait()
  94. if err == errMuxerStopped {
  95. if h.stoppedGracefully {
  96. return nil
  97. }
  98. h.observer.log.Info().Uint8(LogFieldConnIndex, h.connIndex).Msg("Unexpected muxer shutdown")
  99. }
  100. return err
  101. }
  102. func (h *h2muxConnection) ServeClassicTunnel(ctx context.Context, classicTunnel *ClassicTunnelConfig, credentialManager CredentialManager, registrationOptions *tunnelpogs.RegistrationOptions, connectedFuse ConnectedFuse) error {
  103. errGroup, serveCtx := errgroup.WithContext(ctx)
  104. errGroup.Go(func() error {
  105. return h.serveMuxer(serveCtx)
  106. })
  107. errGroup.Go(func() (err error) {
  108. defer func() {
  109. if err == nil {
  110. connectedFuse.Connected()
  111. }
  112. }()
  113. if classicTunnel.UseReconnectToken && connectedFuse.IsConnected() {
  114. err := h.reconnectTunnel(ctx, credentialManager, classicTunnel, registrationOptions)
  115. if err == nil {
  116. return nil
  117. }
  118. // log errors and proceed to RegisterTunnel
  119. h.observer.log.Err(err).
  120. Uint8(LogFieldConnIndex, h.connIndex).
  121. Msg("Couldn't reconnect connection. Re-registering it instead.")
  122. }
  123. return h.registerTunnel(ctx, credentialManager, classicTunnel, registrationOptions)
  124. })
  125. errGroup.Go(func() error {
  126. h.controlLoop(serveCtx, connectedFuse, false)
  127. return nil
  128. })
  129. err := errGroup.Wait()
  130. if err == errMuxerStopped {
  131. if h.stoppedGracefully {
  132. return nil
  133. }
  134. h.observer.log.Info().Uint8(LogFieldConnIndex, h.connIndex).Msg("Unexpected muxer shutdown")
  135. }
  136. return err
  137. }
  138. func (h *h2muxConnection) serveMuxer(ctx context.Context) error {
  139. // All routines should stop when muxer finish serving. When muxer is shutdown
  140. // gracefully, it doesn't return an error, so we need to return errMuxerShutdown
  141. // here to notify other routines to stop
  142. err := h.muxer.Serve(ctx)
  143. if err == nil {
  144. return errMuxerStopped
  145. }
  146. return err
  147. }
  148. func (h *h2muxConnection) controlLoop(ctx context.Context, connectedFuse ConnectedFuse, isNamedTunnel bool) {
  149. updateMetricsTicker := time.NewTicker(h.muxerConfig.MetricsUpdateFreq)
  150. defer updateMetricsTicker.Stop()
  151. var shutdownCompleted <-chan struct{}
  152. for {
  153. select {
  154. case <-h.gracefulShutdownC:
  155. if connectedFuse.IsConnected() {
  156. h.unregister(isNamedTunnel)
  157. }
  158. h.stoppedGracefully = true
  159. h.gracefulShutdownC = nil
  160. shutdownCompleted = h.muxer.Shutdown()
  161. case <-shutdownCompleted:
  162. return
  163. case <-ctx.Done():
  164. // UnregisterTunnel blocks until the RPC call returns
  165. if !h.stoppedGracefully && connectedFuse.IsConnected() {
  166. h.unregister(isNamedTunnel)
  167. }
  168. h.muxer.Shutdown()
  169. // don't wait for shutdown to finish when context is closed, this is the hard termination path
  170. return
  171. case <-updateMetricsTicker.C:
  172. h.observer.metrics.updateMuxerMetrics(h.connIndexStr, h.muxer.Metrics())
  173. }
  174. }
  175. }
  176. func (h *h2muxConnection) newRPCStream(ctx context.Context, rpcName rpcName) (*h2mux.MuxedStream, error) {
  177. openStreamCtx, openStreamCancel := context.WithTimeout(ctx, openStreamTimeout)
  178. defer openStreamCancel()
  179. stream, err := h.muxer.OpenRPCStream(openStreamCtx)
  180. if err != nil {
  181. return nil, err
  182. }
  183. return stream, nil
  184. }
  185. func (h *h2muxConnection) ServeStream(stream *h2mux.MuxedStream) error {
  186. respWriter := &h2muxRespWriter{stream}
  187. req, reqErr := h.newRequest(stream)
  188. if reqErr != nil {
  189. respWriter.WriteErrorResponse()
  190. return reqErr
  191. }
  192. var sourceConnectionType = TypeHTTP
  193. if websocket.IsWebSocketUpgrade(req) {
  194. sourceConnectionType = TypeWebsocket
  195. }
  196. err := h.config.OriginProxy.Proxy(respWriter, req, sourceConnectionType)
  197. if err != nil {
  198. respWriter.WriteErrorResponse()
  199. return err
  200. }
  201. return nil
  202. }
  203. func (h *h2muxConnection) newRequest(stream *h2mux.MuxedStream) (*http.Request, error) {
  204. req, err := http.NewRequest("GET", "http://localhost:8080", h2mux.MuxedStreamReader{MuxedStream: stream})
  205. if err != nil {
  206. return nil, errors.Wrap(err, "Unexpected error from http.NewRequest")
  207. }
  208. err = H2RequestHeadersToH1Request(stream.Headers, req)
  209. if err != nil {
  210. return nil, errors.Wrap(err, "invalid request received")
  211. }
  212. return req, nil
  213. }
  214. type h2muxRespWriter struct {
  215. *h2mux.MuxedStream
  216. }
  217. func (rp *h2muxRespWriter) WriteRespHeaders(status int, header http.Header) error {
  218. headers := H1ResponseToH2ResponseHeaders(status, header)
  219. headers = append(headers, h2mux.Header{Name: ResponseMetaHeader, Value: responseMetaHeaderOrigin})
  220. return rp.WriteHeaders(headers)
  221. }
  222. func (rp *h2muxRespWriter) WriteErrorResponse() {
  223. _ = rp.WriteHeaders([]h2mux.Header{
  224. {Name: ":status", Value: "502"},
  225. {Name: ResponseMetaHeader, Value: responseMetaHeaderCfd},
  226. })
  227. _, _ = rp.Write([]byte("502 Bad Gateway"))
  228. }