mirror of https://github.com/v2ray/v2ray-core
				
				
				
			
		
			
				
	
	
		
			215 lines
		
	
	
		
			5.7 KiB
		
	
	
	
		
			Go
		
	
	
			
		
		
	
	
			215 lines
		
	
	
		
			5.7 KiB
		
	
	
	
		
			Go
		
	
	
| // +build !confonly
 | |
| 
 | |
| package dokodemo
 | |
| 
 | |
| //go:generate errorgen
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"sync/atomic"
 | |
| 	"time"
 | |
| 
 | |
| 	"v2ray.com/core"
 | |
| 	"v2ray.com/core/common"
 | |
| 	"v2ray.com/core/common/buf"
 | |
| 	"v2ray.com/core/common/log"
 | |
| 	"v2ray.com/core/common/net"
 | |
| 	"v2ray.com/core/common/protocol"
 | |
| 	"v2ray.com/core/common/session"
 | |
| 	"v2ray.com/core/common/signal"
 | |
| 	"v2ray.com/core/common/task"
 | |
| 	"v2ray.com/core/features/policy"
 | |
| 	"v2ray.com/core/features/routing"
 | |
| 	"v2ray.com/core/transport/internet"
 | |
| )
 | |
| 
 | |
| func init() {
 | |
| 	common.Must(common.RegisterConfig((*Config)(nil), func(ctx context.Context, config interface{}) (interface{}, error) {
 | |
| 		d := new(DokodemoDoor)
 | |
| 		err := core.RequireFeatures(ctx, func(pm policy.Manager) error {
 | |
| 			return d.Init(config.(*Config), pm, session.SockoptFromContext(ctx))
 | |
| 		})
 | |
| 		return d, err
 | |
| 	}))
 | |
| }
 | |
| 
 | |
| type DokodemoDoor struct {
 | |
| 	policyManager policy.Manager
 | |
| 	config        *Config
 | |
| 	address       net.Address
 | |
| 	port          net.Port
 | |
| 	sockopt       *session.Sockopt
 | |
| }
 | |
| 
 | |
| // Init initializes the DokodemoDoor instance with necessary parameters.
 | |
| func (d *DokodemoDoor) Init(config *Config, pm policy.Manager, sockopt *session.Sockopt) error {
 | |
| 	if (config.NetworkList == nil || len(config.NetworkList.Network) == 0) && len(config.Networks) == 0 {
 | |
| 		return newError("no network specified")
 | |
| 	}
 | |
| 	d.config = config
 | |
| 	d.address = config.GetPredefinedAddress()
 | |
| 	d.port = net.Port(config.Port)
 | |
| 	d.policyManager = pm
 | |
| 	d.sockopt = sockopt
 | |
| 
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // Network implements proxy.Inbound.
 | |
| func (d *DokodemoDoor) Network() []net.Network {
 | |
| 	if len(d.config.Networks) > 0 {
 | |
| 		return d.config.Networks
 | |
| 	}
 | |
| 
 | |
| 	return d.config.NetworkList.Network
 | |
| }
 | |
| 
 | |
| func (d *DokodemoDoor) policy() policy.Session {
 | |
| 	config := d.config
 | |
| 	p := d.policyManager.ForLevel(config.UserLevel)
 | |
| 	if config.Timeout > 0 && config.UserLevel == 0 {
 | |
| 		p.Timeouts.ConnectionIdle = time.Duration(config.Timeout) * time.Second
 | |
| 	}
 | |
| 	return p
 | |
| }
 | |
| 
 | |
| type hasHandshakeAddress interface {
 | |
| 	HandshakeAddress() net.Address
 | |
| }
 | |
| 
 | |
| // Process implements proxy.Inbound.
 | |
| func (d *DokodemoDoor) Process(ctx context.Context, network net.Network, conn internet.Connection, dispatcher routing.Dispatcher) error {
 | |
| 	newError("processing connection from: ", conn.RemoteAddr()).AtDebug().WriteToLog(session.ExportIDToError(ctx))
 | |
| 	dest := net.Destination{
 | |
| 		Network: network,
 | |
| 		Address: d.address,
 | |
| 		Port:    d.port,
 | |
| 	}
 | |
| 
 | |
| 	destinationOverridden := false
 | |
| 	if d.config.FollowRedirect {
 | |
| 		if outbound := session.OutboundFromContext(ctx); outbound != nil && outbound.Target.IsValid() {
 | |
| 			dest = outbound.Target
 | |
| 			destinationOverridden = true
 | |
| 		} else if handshake, ok := conn.(hasHandshakeAddress); ok {
 | |
| 			addr := handshake.HandshakeAddress()
 | |
| 			if addr != nil {
 | |
| 				dest.Address = addr
 | |
| 				destinationOverridden = true
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 	if !dest.IsValid() || dest.Address == nil {
 | |
| 		return newError("unable to get destination")
 | |
| 	}
 | |
| 
 | |
| 	if inbound := session.InboundFromContext(ctx); inbound != nil {
 | |
| 		inbound.User = &protocol.MemoryUser{
 | |
| 			Level: d.config.UserLevel,
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	ctx = log.ContextWithAccessMessage(ctx, &log.AccessMessage{
 | |
| 		From:   conn.RemoteAddr(),
 | |
| 		To:     dest,
 | |
| 		Status: log.AccessAccepted,
 | |
| 		Reason: "",
 | |
| 	})
 | |
| 	newError("received request for ", conn.RemoteAddr()).WriteToLog(session.ExportIDToError(ctx))
 | |
| 
 | |
| 	plcy := d.policy()
 | |
| 	ctx, cancel := context.WithCancel(ctx)
 | |
| 	timer := signal.CancelAfterInactivity(ctx, cancel, plcy.Timeouts.ConnectionIdle)
 | |
| 
 | |
| 	ctx = policy.ContextWithBufferPolicy(ctx, plcy.Buffer)
 | |
| 	link, err := dispatcher.Dispatch(ctx, dest)
 | |
| 	if err != nil {
 | |
| 		return newError("failed to dispatch request").Base(err)
 | |
| 	}
 | |
| 
 | |
| 	requestCount := int32(1)
 | |
| 	requestDone := func() error {
 | |
| 		defer func() {
 | |
| 			if atomic.AddInt32(&requestCount, -1) == 0 {
 | |
| 				timer.SetTimeout(plcy.Timeouts.DownlinkOnly)
 | |
| 			}
 | |
| 		}()
 | |
| 
 | |
| 		var reader buf.Reader
 | |
| 		if dest.Network == net.Network_UDP {
 | |
| 			reader = buf.NewPacketReader(conn)
 | |
| 		} else {
 | |
| 			reader = buf.NewReader(conn)
 | |
| 		}
 | |
| 		if err := buf.Copy(reader, link.Writer, buf.UpdateActivity(timer)); err != nil {
 | |
| 			return newError("failed to transport request").Base(err)
 | |
| 		}
 | |
| 
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	tproxyRequest := func() error {
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	var writer buf.Writer
 | |
| 	if network == net.Network_TCP {
 | |
| 		writer = buf.NewWriter(conn)
 | |
| 	} else {
 | |
| 		//if we are in TPROXY mode, use linux's udp forging functionality
 | |
| 		if !destinationOverridden {
 | |
| 			writer = &buf.SequentialWriter{Writer: conn}
 | |
| 		} else {
 | |
| 			sockopt := &internet.SocketConfig{
 | |
| 				Tproxy: internet.SocketConfig_TProxy,
 | |
| 			}
 | |
| 			if dest.Address.Family().IsIP() {
 | |
| 				sockopt.BindAddress = dest.Address.IP()
 | |
| 				sockopt.BindPort = uint32(dest.Port)
 | |
| 			}
 | |
| 			if d.sockopt != nil {
 | |
| 				sockopt.Mark = d.sockopt.Mark
 | |
| 			}
 | |
| 			tConn, err := internet.DialSystem(ctx, net.DestinationFromAddr(conn.RemoteAddr()), sockopt)
 | |
| 			if err != nil {
 | |
| 				return err
 | |
| 			}
 | |
| 			defer tConn.Close()
 | |
| 
 | |
| 			writer = &buf.SequentialWriter{Writer: tConn}
 | |
| 			tReader := buf.NewPacketReader(tConn)
 | |
| 			requestCount++
 | |
| 			tproxyRequest = func() error {
 | |
| 				defer func() {
 | |
| 					if atomic.AddInt32(&requestCount, -1) == 0 {
 | |
| 						timer.SetTimeout(plcy.Timeouts.DownlinkOnly)
 | |
| 					}
 | |
| 				}()
 | |
| 				if err := buf.Copy(tReader, link.Writer, buf.UpdateActivity(timer)); err != nil {
 | |
| 					return newError("failed to transport request (TPROXY conn)").Base(err)
 | |
| 				}
 | |
| 				return nil
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	responseDone := func() error {
 | |
| 		defer timer.SetTimeout(plcy.Timeouts.UplinkOnly)
 | |
| 
 | |
| 		if err := buf.Copy(link.Reader, writer, buf.UpdateActivity(timer)); err != nil {
 | |
| 			return newError("failed to transport response").Base(err)
 | |
| 		}
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	if err := task.Run(ctx, task.OnSuccess(func() error {
 | |
| 		return task.Run(ctx, requestDone, tproxyRequest)
 | |
| 	}, task.Close(link.Writer)), responseDone); err != nil {
 | |
| 		common.Interrupt(link.Reader)
 | |
| 		common.Interrupt(link.Writer)
 | |
| 		return newError("connection ends").Base(err)
 | |
| 	}
 | |
| 
 | |
| 	return nil
 | |
| }
 |