mirror of https://github.com/XTLS/Xray-core
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
251 lines
6.8 KiB
251 lines
6.8 KiB
package shadowsocks_2022 |
|
|
|
import ( |
|
"context" |
|
"encoding/base64" |
|
"strconv" |
|
"strings" |
|
"sync" |
|
|
|
"github.com/sagernet/sing-shadowsocks/shadowaead_2022" |
|
C "github.com/sagernet/sing/common" |
|
A "github.com/sagernet/sing/common/auth" |
|
B "github.com/sagernet/sing/common/buf" |
|
"github.com/sagernet/sing/common/bufio" |
|
E "github.com/sagernet/sing/common/exceptions" |
|
M "github.com/sagernet/sing/common/metadata" |
|
N "github.com/sagernet/sing/common/network" |
|
"github.com/xtls/xray-core/common" |
|
"github.com/xtls/xray-core/common/buf" |
|
"github.com/xtls/xray-core/common/log" |
|
"github.com/xtls/xray-core/common/net" |
|
"github.com/xtls/xray-core/common/protocol" |
|
"github.com/xtls/xray-core/common/session" |
|
"github.com/xtls/xray-core/common/uuid" |
|
"github.com/xtls/xray-core/features/routing" |
|
"github.com/xtls/xray-core/transport/internet/stat" |
|
) |
|
|
|
func init() { |
|
common.Must(common.RegisterConfig((*MultiUserServerConfig)(nil), func(ctx context.Context, config interface{}) (interface{}, error) { |
|
return NewMultiServer(ctx, config.(*MultiUserServerConfig)) |
|
})) |
|
} |
|
|
|
type MultiUserInbound struct { |
|
sync.Mutex |
|
networks []net.Network |
|
users []*User |
|
service *shadowaead_2022.MultiService[int] |
|
} |
|
|
|
func NewMultiServer(ctx context.Context, config *MultiUserServerConfig) (*MultiUserInbound, error) { |
|
networks := config.Network |
|
if len(networks) == 0 { |
|
networks = []net.Network{ |
|
net.Network_TCP, |
|
net.Network_UDP, |
|
} |
|
} |
|
inbound := &MultiUserInbound{ |
|
networks: networks, |
|
users: config.Users, |
|
} |
|
if config.Key == "" { |
|
return nil, newError("missing key") |
|
} |
|
psk, err := base64.StdEncoding.DecodeString(config.Key) |
|
if err != nil { |
|
return nil, newError("parse config").Base(err) |
|
} |
|
service, err := shadowaead_2022.NewMultiService[int](config.Method, psk, 500, inbound) |
|
if err != nil { |
|
return nil, newError("create service").Base(err) |
|
} |
|
|
|
for i, user := range config.Users { |
|
if user.Email == "" { |
|
u := uuid.New() |
|
user.Email = "unnamed-user-" + strconv.Itoa(i) + "-" + u.String() |
|
} |
|
} |
|
err = service.UpdateUsersWithPasswords( |
|
C.MapIndexed(config.Users, func(index int, it *User) int { return index }), |
|
C.Map(config.Users, func(it *User) string { return it.Key }), |
|
) |
|
if err != nil { |
|
return nil, newError("create service").Base(err) |
|
} |
|
|
|
inbound.service = service |
|
return inbound, nil |
|
} |
|
|
|
// AddUser implements proxy.UserManager.AddUser(). |
|
func (i *MultiUserInbound) AddUser(ctx context.Context, u *protocol.MemoryUser) error { |
|
i.Lock() |
|
defer i.Unlock() |
|
|
|
account := u.Account.(*MemoryAccount) |
|
if account.Email != "" { |
|
for idx := range i.users { |
|
if i.users[idx].Email == account.Email { |
|
return newError("User ", account.Email, " already exists.") |
|
} |
|
} |
|
} |
|
i.users = append(i.users, &User{ |
|
Key: account.Key, |
|
Email: account.Email, |
|
Level: account.Level, |
|
}) |
|
|
|
// sync to multi service |
|
// Considering implements shadowsocks2022 in xray-core may have better performance. |
|
i.service.UpdateUsersWithPasswords( |
|
C.MapIndexed(i.users, func(index int, it *User) int { return index }), |
|
C.Map(i.users, func(it *User) string { return it.Key }), |
|
) |
|
|
|
return nil |
|
} |
|
|
|
// RemoveUser implements proxy.UserManager.RemoveUser(). |
|
func (i *MultiUserInbound) RemoveUser(ctx context.Context, email string) error { |
|
if email == "" { |
|
return newError("Email must not be empty.") |
|
} |
|
|
|
i.Lock() |
|
defer i.Unlock() |
|
|
|
idx := -1 |
|
for ii, u := range i.users { |
|
if strings.EqualFold(u.Email, email) { |
|
idx = ii |
|
break |
|
} |
|
} |
|
|
|
if idx == -1 { |
|
return newError("User ", email, " not found.") |
|
} |
|
|
|
ulen := len(i.users) |
|
|
|
i.users[idx] = i.users[ulen-1] |
|
i.users[ulen-1] = nil |
|
i.users = i.users[:ulen-1] |
|
|
|
// sync to multi service |
|
// Considering implements shadowsocks2022 in xray-core may have better performance. |
|
i.service.UpdateUsersWithPasswords( |
|
C.MapIndexed(i.users, func(index int, it *User) int { return index }), |
|
C.Map(i.users, func(it *User) string { return it.Key }), |
|
) |
|
|
|
return nil |
|
} |
|
|
|
func (i *MultiUserInbound) Network() []net.Network { |
|
return i.networks |
|
} |
|
|
|
func (i *MultiUserInbound) Process(ctx context.Context, network net.Network, connection stat.Connection, dispatcher routing.Dispatcher) error { |
|
inbound := session.InboundFromContext(ctx) |
|
|
|
var metadata M.Metadata |
|
if inbound.Source.IsValid() { |
|
metadata.Source = M.ParseSocksaddr(inbound.Source.NetAddr()) |
|
} |
|
|
|
ctx = session.ContextWithDispatcher(ctx, dispatcher) |
|
|
|
if network == net.Network_TCP { |
|
return returnError(i.service.NewConnection(ctx, connection, metadata)) |
|
} else { |
|
reader := buf.NewReader(connection) |
|
pc := &natPacketConn{connection} |
|
for { |
|
mb, err := reader.ReadMultiBuffer() |
|
if err != nil { |
|
buf.ReleaseMulti(mb) |
|
return returnError(err) |
|
} |
|
for _, buffer := range mb { |
|
packet := B.As(buffer.Bytes()).ToOwned() |
|
err = i.service.NewPacket(ctx, pc, packet, metadata) |
|
if err != nil { |
|
packet.Release() |
|
buf.ReleaseMulti(mb) |
|
return err |
|
} |
|
buffer.Release() |
|
} |
|
} |
|
} |
|
} |
|
|
|
func (i *MultiUserInbound) NewConnection(ctx context.Context, conn net.Conn, metadata M.Metadata) error { |
|
inbound := session.InboundFromContext(ctx) |
|
userInt, _ := A.UserFromContext[int](ctx) |
|
user := i.users[userInt] |
|
inbound.User = &protocol.MemoryUser{ |
|
Email: user.Email, |
|
Level: uint32(user.Level), |
|
} |
|
ctx = log.ContextWithAccessMessage(ctx, &log.AccessMessage{ |
|
From: metadata.Source, |
|
To: metadata.Destination, |
|
Status: log.AccessAccepted, |
|
Email: user.Email, |
|
}) |
|
newError("tunnelling request to tcp:", metadata.Destination).WriteToLog(session.ExportIDToError(ctx)) |
|
dispatcher := session.DispatcherFromContext(ctx) |
|
link, err := dispatcher.Dispatch(ctx, toDestination(metadata.Destination, net.Network_TCP)) |
|
if err != nil { |
|
return err |
|
} |
|
outConn := &pipeConnWrapper{ |
|
&buf.BufferedReader{Reader: link.Reader}, |
|
link.Writer, |
|
conn, |
|
} |
|
return bufio.CopyConn(ctx, conn, outConn) |
|
} |
|
|
|
func (i *MultiUserInbound) NewPacketConnection(ctx context.Context, conn N.PacketConn, metadata M.Metadata) error { |
|
inbound := session.InboundFromContext(ctx) |
|
userInt, _ := A.UserFromContext[int](ctx) |
|
user := i.users[userInt] |
|
inbound.User = &protocol.MemoryUser{ |
|
Email: user.Email, |
|
Level: uint32(user.Level), |
|
} |
|
ctx = log.ContextWithAccessMessage(ctx, &log.AccessMessage{ |
|
From: metadata.Source, |
|
To: metadata.Destination, |
|
Status: log.AccessAccepted, |
|
Email: user.Email, |
|
}) |
|
newError("tunnelling request to udp:", metadata.Destination).WriteToLog(session.ExportIDToError(ctx)) |
|
dispatcher := session.DispatcherFromContext(ctx) |
|
destination := toDestination(metadata.Destination, net.Network_UDP) |
|
link, err := dispatcher.Dispatch(ctx, destination) |
|
if err != nil { |
|
return err |
|
} |
|
outConn := &packetConnWrapper{ |
|
Reader: link.Reader, |
|
Writer: link.Writer, |
|
Dest: destination, |
|
} |
|
return bufio.CopyPacketConn(ctx, conn, outConn) |
|
} |
|
|
|
func (i *MultiUserInbound) NewError(ctx context.Context, err error) { |
|
if E.IsClosed(err) { |
|
return |
|
} |
|
newError(err).AtWarning().WriteToLog() |
|
}
|
|
|