mirror of https://github.com/v2ray/v2ray-core
				
				
				
			
		
			
				
	
	
		
			210 lines
		
	
	
		
			5.5 KiB
		
	
	
	
		
			Go
		
	
	
			
		
		
	
	
			210 lines
		
	
	
		
			5.5 KiB
		
	
	
	
		
			Go
		
	
	
// +build !confonly
 | 
						|
 | 
						|
package dokodemo
 | 
						|
 | 
						|
//go:generate errorgen
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"sync/atomic"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"v2ray.com/core"
 | 
						|
	"v2ray.com/core/common"
 | 
						|
	"v2ray.com/core/common/buf"
 | 
						|
	"v2ray.com/core/common/log"
 | 
						|
	"v2ray.com/core/common/net"
 | 
						|
	"v2ray.com/core/common/protocol"
 | 
						|
	"v2ray.com/core/common/session"
 | 
						|
	"v2ray.com/core/common/signal"
 | 
						|
	"v2ray.com/core/common/task"
 | 
						|
	"v2ray.com/core/features/policy"
 | 
						|
	"v2ray.com/core/features/routing"
 | 
						|
	"v2ray.com/core/transport/internet"
 | 
						|
)
 | 
						|
 | 
						|
func init() {
 | 
						|
	common.Must(common.RegisterConfig((*Config)(nil), func(ctx context.Context, config interface{}) (interface{}, error) {
 | 
						|
		d := new(DokodemoDoor)
 | 
						|
		err := core.RequireFeatures(ctx, func(pm policy.Manager) error {
 | 
						|
			return d.Init(config.(*Config), pm)
 | 
						|
		})
 | 
						|
		return d, err
 | 
						|
	}))
 | 
						|
}
 | 
						|
 | 
						|
type DokodemoDoor struct {
 | 
						|
	policyManager policy.Manager
 | 
						|
	config        *Config
 | 
						|
	address       net.Address
 | 
						|
	port          net.Port
 | 
						|
}
 | 
						|
 | 
						|
// Init initializes the DokodemoDoor instance with necessary parameters.
 | 
						|
func (d *DokodemoDoor) Init(config *Config, pm policy.Manager) error {
 | 
						|
	if (config.NetworkList == nil || len(config.NetworkList.Network) == 0) && len(config.Networks) == 0 {
 | 
						|
		return newError("no network specified")
 | 
						|
	}
 | 
						|
	d.config = config
 | 
						|
	d.address = config.GetPredefinedAddress()
 | 
						|
	d.port = net.Port(config.Port)
 | 
						|
	d.policyManager = pm
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// Network implements proxy.Inbound.
 | 
						|
func (d *DokodemoDoor) Network() []net.Network {
 | 
						|
	if len(d.config.Networks) > 0 {
 | 
						|
		return d.config.Networks
 | 
						|
	}
 | 
						|
 | 
						|
	return d.config.NetworkList.Network
 | 
						|
}
 | 
						|
 | 
						|
func (d *DokodemoDoor) policy() policy.Session {
 | 
						|
	config := d.config
 | 
						|
	p := d.policyManager.ForLevel(config.UserLevel)
 | 
						|
	if config.Timeout > 0 && config.UserLevel == 0 {
 | 
						|
		p.Timeouts.ConnectionIdle = time.Duration(config.Timeout) * time.Second
 | 
						|
	}
 | 
						|
	return p
 | 
						|
}
 | 
						|
 | 
						|
type hasHandshakeAddress interface {
 | 
						|
	HandshakeAddress() net.Address
 | 
						|
}
 | 
						|
 | 
						|
// Process implements proxy.Inbound.
 | 
						|
func (d *DokodemoDoor) Process(ctx context.Context, network net.Network, conn internet.Connection, dispatcher routing.Dispatcher) error {
 | 
						|
	newError("processing connection from: ", conn.RemoteAddr()).AtDebug().WriteToLog(session.ExportIDToError(ctx))
 | 
						|
	dest := net.Destination{
 | 
						|
		Network: network,
 | 
						|
		Address: d.address,
 | 
						|
		Port:    d.port,
 | 
						|
	}
 | 
						|
 | 
						|
	destinationOverridden := false
 | 
						|
	if d.config.FollowRedirect {
 | 
						|
		if outbound := session.OutboundFromContext(ctx); outbound != nil && outbound.Target.IsValid() {
 | 
						|
			dest = outbound.Target
 | 
						|
			destinationOverridden = true
 | 
						|
		} else if handshake, ok := conn.(hasHandshakeAddress); ok {
 | 
						|
			addr := handshake.HandshakeAddress()
 | 
						|
			if addr != nil {
 | 
						|
				dest.Address = addr
 | 
						|
				destinationOverridden = true
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
	if !dest.IsValid() || dest.Address == nil {
 | 
						|
		return newError("unable to get destination")
 | 
						|
	}
 | 
						|
 | 
						|
	if inbound := session.InboundFromContext(ctx); inbound != nil {
 | 
						|
		inbound.User = &protocol.MemoryUser{
 | 
						|
			Level: d.config.UserLevel,
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	ctx = log.ContextWithAccessMessage(ctx, &log.AccessMessage{
 | 
						|
		From:   conn.RemoteAddr(),
 | 
						|
		To:     dest,
 | 
						|
		Status: log.AccessAccepted,
 | 
						|
		Reason: "",
 | 
						|
	})
 | 
						|
	newError("received request for ", conn.RemoteAddr()).WriteToLog(session.ExportIDToError(ctx))
 | 
						|
 | 
						|
	plcy := d.policy()
 | 
						|
	ctx, cancel := context.WithCancel(ctx)
 | 
						|
	timer := signal.CancelAfterInactivity(ctx, cancel, plcy.Timeouts.ConnectionIdle)
 | 
						|
 | 
						|
	ctx = policy.ContextWithBufferPolicy(ctx, plcy.Buffer)
 | 
						|
	link, err := dispatcher.Dispatch(ctx, dest)
 | 
						|
	if err != nil {
 | 
						|
		return newError("failed to dispatch request").Base(err)
 | 
						|
	}
 | 
						|
 | 
						|
	requestCount := int32(1)
 | 
						|
	requestDone := func() error {
 | 
						|
		defer func() {
 | 
						|
			if atomic.AddInt32(&requestCount, -1) == 0 {
 | 
						|
				timer.SetTimeout(plcy.Timeouts.DownlinkOnly)
 | 
						|
			}
 | 
						|
		}()
 | 
						|
 | 
						|
		var reader buf.Reader
 | 
						|
		if dest.Network == net.Network_UDP {
 | 
						|
			reader = buf.NewPacketReader(conn)
 | 
						|
		} else {
 | 
						|
			reader = buf.NewReader(conn)
 | 
						|
		}
 | 
						|
		if err := buf.Copy(reader, link.Writer, buf.UpdateActivity(timer)); err != nil {
 | 
						|
			return newError("failed to transport request").Base(err)
 | 
						|
		}
 | 
						|
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	tproxyRequest := func() error {
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	var writer buf.Writer
 | 
						|
	if network == net.Network_TCP {
 | 
						|
		writer = buf.NewWriter(conn)
 | 
						|
	} else {
 | 
						|
		//if we are in TPROXY mode, use linux's udp forging functionality
 | 
						|
		if !destinationOverridden {
 | 
						|
			writer = &buf.SequentialWriter{Writer: conn}
 | 
						|
		} else {
 | 
						|
			sockopt := &internet.SocketConfig{
 | 
						|
				Tproxy: internet.SocketConfig_TProxy,
 | 
						|
			}
 | 
						|
			if dest.Address.Family().IsIP() {
 | 
						|
				sockopt.BindAddress = dest.Address.IP()
 | 
						|
				sockopt.BindPort = uint32(dest.Port)
 | 
						|
			}
 | 
						|
			tConn, err := internet.DialSystem(ctx, net.DestinationFromAddr(conn.RemoteAddr()), sockopt)
 | 
						|
			if err != nil {
 | 
						|
				return err
 | 
						|
			}
 | 
						|
			defer tConn.Close()
 | 
						|
 | 
						|
			writer = &buf.SequentialWriter{Writer: tConn}
 | 
						|
			tReader := buf.NewPacketReader(tConn)
 | 
						|
			requestCount++
 | 
						|
			tproxyRequest = func() error {
 | 
						|
				defer func() {
 | 
						|
					if atomic.AddInt32(&requestCount, -1) == 0 {
 | 
						|
						timer.SetTimeout(plcy.Timeouts.DownlinkOnly)
 | 
						|
					}
 | 
						|
				}()
 | 
						|
				if err := buf.Copy(tReader, link.Writer, buf.UpdateActivity(timer)); err != nil {
 | 
						|
					return newError("failed to transport request (TPROXY conn)").Base(err)
 | 
						|
				}
 | 
						|
				return nil
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	responseDone := func() error {
 | 
						|
		defer timer.SetTimeout(plcy.Timeouts.UplinkOnly)
 | 
						|
 | 
						|
		if err := buf.Copy(link.Reader, writer, buf.UpdateActivity(timer)); err != nil {
 | 
						|
			return newError("failed to transport response").Base(err)
 | 
						|
		}
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	if err := task.Run(ctx, task.OnSuccess(func() error {
 | 
						|
		return task.Run(ctx, requestDone, tproxyRequest)
 | 
						|
	}, task.Close(link.Writer)), responseDone); err != nil {
 | 
						|
		common.Interrupt(link.Reader)
 | 
						|
		common.Interrupt(link.Writer)
 | 
						|
		return newError("connection ends").Base(err)
 | 
						|
	}
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 |