config.go 1.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869
  1. package tls
  2. import (
  3. "context"
  4. "crypto/tls"
  5. "v2ray.com/core/common/net"
  6. "v2ray.com/core/transport/internet"
  7. )
  8. var (
  9. globalSessionCache = tls.NewLRUClientSessionCache(128)
  10. )
  11. func (c *Config) BuildCertificates() []tls.Certificate {
  12. certs := make([]tls.Certificate, 0, len(c.Certificate))
  13. for _, entry := range c.Certificate {
  14. keyPair, err := tls.X509KeyPair(entry.Certificate, entry.Key)
  15. if err != nil {
  16. newError("ignoring invalid X509 key pair").Base(err).AtWarning().WriteToLog()
  17. continue
  18. }
  19. certs = append(certs, keyPair)
  20. }
  21. return certs
  22. }
  23. func (c *Config) GetTLSConfig() *tls.Config {
  24. config := &tls.Config{
  25. ClientSessionCache: globalSessionCache,
  26. NextProtos: []string{"http/1.1"},
  27. }
  28. if c == nil {
  29. return config
  30. }
  31. config.InsecureSkipVerify = c.AllowInsecure
  32. config.Certificates = c.BuildCertificates()
  33. config.BuildNameToCertificate()
  34. if len(c.ServerName) > 0 {
  35. config.ServerName = c.ServerName
  36. }
  37. return config
  38. }
  39. type Option func(*Config)
  40. func WithDestination(dest net.Destination) Option {
  41. return func(config *Config) {
  42. if dest.Address.Family().IsDomain() && len(config.ServerName) == 0 {
  43. config.ServerName = dest.Address.Domain()
  44. }
  45. }
  46. }
  47. func ConfigFromContext(ctx context.Context, opts ...Option) *Config {
  48. securitySettings := internet.SecuritySettingsFromContext(ctx)
  49. if securitySettings == nil {
  50. return nil
  51. }
  52. if config, ok := securitySettings.(*Config); ok {
  53. for _, opt := range opts {
  54. opt(config)
  55. }
  56. return config
  57. }
  58. return nil
  59. }