outbound.go 5.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186
  1. package outbound
  2. //go:generate errorgen
  3. import (
  4. "context"
  5. "time"
  6. "v2ray.com/core"
  7. "v2ray.com/core/common"
  8. "v2ray.com/core/common/buf"
  9. "v2ray.com/core/common/net"
  10. "v2ray.com/core/common/platform"
  11. "v2ray.com/core/common/protocol"
  12. "v2ray.com/core/common/retry"
  13. "v2ray.com/core/common/session"
  14. "v2ray.com/core/common/signal"
  15. "v2ray.com/core/common/task"
  16. "v2ray.com/core/common/vio"
  17. "v2ray.com/core/features/policy"
  18. "v2ray.com/core/proxy/vmess"
  19. "v2ray.com/core/proxy/vmess/encoding"
  20. "v2ray.com/core/transport/internet"
  21. )
  22. // Handler is an outbound connection handler for VMess protocol.
  23. type Handler struct {
  24. serverList *protocol.ServerList
  25. serverPicker protocol.ServerPicker
  26. policyManager policy.Manager
  27. }
  28. // New creates a new VMess outbound handler.
  29. func New(ctx context.Context, config *Config) (*Handler, error) {
  30. serverList := protocol.NewServerList()
  31. for _, rec := range config.Receiver {
  32. s, err := protocol.NewServerSpecFromPB(*rec)
  33. if err != nil {
  34. return nil, newError("failed to parse server spec").Base(err)
  35. }
  36. serverList.AddServer(s)
  37. }
  38. v := core.MustFromContext(ctx)
  39. handler := &Handler{
  40. serverList: serverList,
  41. serverPicker: protocol.NewRoundRobinServerPicker(serverList),
  42. policyManager: v.GetFeature(policy.ManagerType()).(policy.Manager),
  43. }
  44. return handler, nil
  45. }
  46. // Process implements proxy.Outbound.Process().
  47. func (v *Handler) Process(ctx context.Context, link *vio.Link, dialer internet.Dialer) error {
  48. var rec *protocol.ServerSpec
  49. var conn internet.Connection
  50. err := retry.ExponentialBackoff(5, 200).On(func() error {
  51. rec = v.serverPicker.PickServer()
  52. rawConn, err := dialer.Dial(ctx, rec.Destination())
  53. if err != nil {
  54. return err
  55. }
  56. conn = rawConn
  57. return nil
  58. })
  59. if err != nil {
  60. return newError("failed to find an available destination").Base(err).AtWarning()
  61. }
  62. defer conn.Close() //nolint: errcheck
  63. outbound := session.OutboundFromContext(ctx)
  64. if outbound == nil || !outbound.Target.IsValid() {
  65. return newError("target not specified").AtError()
  66. }
  67. target := outbound.Target
  68. newError("tunneling request to ", target, " via ", rec.Destination()).WriteToLog(session.ExportIDToError(ctx))
  69. command := protocol.RequestCommandTCP
  70. if target.Network == net.Network_UDP {
  71. command = protocol.RequestCommandUDP
  72. }
  73. if target.Address.Family().IsDomain() && target.Address.Domain() == "v1.mux.cool" {
  74. command = protocol.RequestCommandMux
  75. }
  76. request := &protocol.RequestHeader{
  77. Version: encoding.Version,
  78. User: rec.PickUser(),
  79. Command: command,
  80. Address: target.Address,
  81. Port: target.Port,
  82. Option: protocol.RequestOptionChunkStream,
  83. }
  84. account := request.User.Account.(*vmess.MemoryAccount)
  85. request.Security = account.Security
  86. if request.Security == protocol.SecurityType_AES128_GCM || request.Security == protocol.SecurityType_NONE || request.Security == protocol.SecurityType_CHACHA20_POLY1305 {
  87. request.Option.Set(protocol.RequestOptionChunkMasking)
  88. }
  89. if enablePadding && request.Option.Has(protocol.RequestOptionChunkMasking) {
  90. request.Option.Set(protocol.RequestOptionGlobalPadding)
  91. }
  92. input := link.Reader
  93. output := link.Writer
  94. session := encoding.NewClientSession(protocol.DefaultIDHash)
  95. sessionPolicy := v.policyManager.ForLevel(request.User.Level)
  96. ctx, cancel := context.WithCancel(ctx)
  97. timer := signal.CancelAfterInactivity(ctx, cancel, sessionPolicy.Timeouts.ConnectionIdle)
  98. requestDone := func() error {
  99. defer timer.SetTimeout(sessionPolicy.Timeouts.DownlinkOnly)
  100. writer := buf.NewBufferedWriter(buf.NewWriter(conn))
  101. if err := session.EncodeRequestHeader(request, writer); err != nil {
  102. return newError("failed to encode request").Base(err).AtWarning()
  103. }
  104. bodyWriter := session.EncodeRequestBody(request, writer)
  105. if err := buf.CopyOnceTimeout(input, bodyWriter, time.Millisecond*100); err != nil && err != buf.ErrNotTimeoutReader && err != buf.ErrReadTimeout {
  106. return newError("failed to write first payload").Base(err)
  107. }
  108. if err := writer.SetBuffered(false); err != nil {
  109. return err
  110. }
  111. if err := buf.Copy(input, bodyWriter, buf.UpdateActivity(timer)); err != nil {
  112. return err
  113. }
  114. if request.Option.Has(protocol.RequestOptionChunkStream) {
  115. if err := bodyWriter.WriteMultiBuffer(buf.MultiBuffer{}); err != nil {
  116. return err
  117. }
  118. }
  119. return nil
  120. }
  121. responseDone := func() error {
  122. defer timer.SetTimeout(sessionPolicy.Timeouts.UplinkOnly)
  123. reader := &buf.BufferedReader{Reader: buf.NewReader(conn)}
  124. header, err := session.DecodeResponseHeader(reader)
  125. if err != nil {
  126. return newError("failed to read header").Base(err)
  127. }
  128. v.handleCommand(rec.Destination(), header.Command)
  129. bodyReader := session.DecodeResponseBody(request, reader)
  130. return buf.Copy(bodyReader, output, buf.UpdateActivity(timer))
  131. }
  132. var responseDonePost = task.Single(responseDone, task.OnSuccess(task.Close(output)))
  133. if err := task.Run(task.WithContext(ctx), task.Parallel(requestDone, responseDonePost))(); err != nil {
  134. return newError("connection ends").Base(err)
  135. }
  136. return nil
  137. }
  138. var (
  139. enablePadding = false
  140. )
  141. func init() {
  142. common.Must(common.RegisterConfig((*Config)(nil), func(ctx context.Context, config interface{}) (interface{}, error) {
  143. return New(ctx, config.(*Config))
  144. }))
  145. const defaultFlagValue = "NOT_DEFINED_AT_ALL"
  146. paddingValue := platform.NewEnvFlag("v2ray.vmess.padding").GetValue(func() string { return defaultFlagValue })
  147. if paddingValue != defaultFlagValue {
  148. enablePadding = true
  149. }
  150. }