dokodemo.go 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156
  1. package dokodemo
  2. //go:generate errorgen
  3. import (
  4. "context"
  5. "time"
  6. "v2ray.com/core"
  7. "v2ray.com/core/common"
  8. "v2ray.com/core/common/buf"
  9. "v2ray.com/core/common/net"
  10. "v2ray.com/core/common/session"
  11. "v2ray.com/core/common/signal"
  12. "v2ray.com/core/common/task"
  13. "v2ray.com/core/features/policy"
  14. "v2ray.com/core/features/routing"
  15. "v2ray.com/core/transport/internet"
  16. )
  17. func init() {
  18. common.Must(common.RegisterConfig((*Config)(nil), func(ctx context.Context, config interface{}) (interface{}, error) {
  19. d := new(DokodemoDoor)
  20. err := core.RequireFeatures(ctx, func(pm policy.Manager) error {
  21. return d.Init(config.(*Config), pm)
  22. })
  23. return d, err
  24. }))
  25. }
  26. type DokodemoDoor struct {
  27. policyManager policy.Manager
  28. config *Config
  29. address net.Address
  30. port net.Port
  31. }
  32. // Init initializes the DokodemoDoor instance with necessary parameters.
  33. func (d *DokodemoDoor) Init(config *Config, pm policy.Manager) error {
  34. if (config.NetworkList == nil || len(config.NetworkList.Network) == 0) && len(config.Networks) == 0 {
  35. return newError("no network specified")
  36. }
  37. d.config = config
  38. d.address = config.GetPredefinedAddress()
  39. d.port = net.Port(config.Port)
  40. d.policyManager = pm
  41. return nil
  42. }
  43. // Network implements proxy.Inbound.
  44. func (d *DokodemoDoor) Network() []net.Network {
  45. if len(d.config.Networks) > 0 {
  46. return d.config.Networks
  47. }
  48. return d.config.NetworkList.Network
  49. }
  50. func (d *DokodemoDoor) policy() policy.Session {
  51. config := d.config
  52. p := d.policyManager.ForLevel(config.UserLevel)
  53. if config.Timeout > 0 && config.UserLevel == 0 {
  54. p.Timeouts.ConnectionIdle = time.Duration(config.Timeout) * time.Second
  55. }
  56. return p
  57. }
  58. type hasHandshakeAddress interface {
  59. HandshakeAddress() net.Address
  60. }
  61. // Process implements proxy.Inbound.
  62. func (d *DokodemoDoor) Process(ctx context.Context, network net.Network, conn internet.Connection, dispatcher routing.Dispatcher) error {
  63. newError("processing connection from: ", conn.RemoteAddr()).AtDebug().WriteToLog(session.ExportIDToError(ctx))
  64. dest := net.Destination{
  65. Network: network,
  66. Address: d.address,
  67. Port: d.port,
  68. }
  69. if d.config.FollowRedirect {
  70. if outbound := session.OutboundFromContext(ctx); outbound != nil && outbound.Target.IsValid() {
  71. dest = outbound.Target
  72. } else if handshake, ok := conn.(hasHandshakeAddress); ok {
  73. addr := handshake.HandshakeAddress()
  74. if addr != nil {
  75. dest.Address = addr
  76. }
  77. }
  78. }
  79. if !dest.IsValid() || dest.Address == nil {
  80. return newError("unable to get destination")
  81. }
  82. plcy := d.policy()
  83. ctx, cancel := context.WithCancel(ctx)
  84. timer := signal.CancelAfterInactivity(ctx, cancel, plcy.Timeouts.ConnectionIdle)
  85. ctx = policy.ContextWithBufferPolicy(ctx, plcy.Buffer)
  86. link, err := dispatcher.Dispatch(ctx, dest)
  87. if err != nil {
  88. return newError("failed to dispatch request").Base(err)
  89. }
  90. requestDone := func() error {
  91. defer timer.SetTimeout(plcy.Timeouts.DownlinkOnly)
  92. reader := buf.NewReader(conn)
  93. if err := buf.Copy(reader, link.Writer, buf.UpdateActivity(timer)); err != nil {
  94. return newError("failed to transport request").Base(err)
  95. }
  96. return nil
  97. }
  98. responseDone := func() error {
  99. defer timer.SetTimeout(plcy.Timeouts.UplinkOnly)
  100. var writer buf.Writer
  101. if network == net.Network_TCP {
  102. writer = buf.NewWriter(conn)
  103. } else {
  104. //if we are in TPROXY mode, use linux's udp forging functionality
  105. if !d.config.FollowRedirect {
  106. writer = &buf.SequentialWriter{Writer: conn}
  107. } else {
  108. sockopt := &internet.SocketConfig{
  109. Tproxy: internet.SocketConfig_TProxy,
  110. }
  111. if dest.Address.Family().IsIP() {
  112. sockopt.BindAddress = dest.Address.IP()
  113. sockopt.BindPort = uint32(dest.Port)
  114. }
  115. tConn, err := internet.DialSystem(ctx, net.DestinationFromAddr(conn.RemoteAddr()), sockopt)
  116. if err != nil {
  117. return err
  118. }
  119. writer = &buf.SequentialWriter{Writer: tConn}
  120. }
  121. }
  122. if err := buf.Copy(link.Reader, writer, buf.UpdateActivity(timer)); err != nil {
  123. return newError("failed to transport response").Base(err)
  124. }
  125. return nil
  126. }
  127. if err := task.Run(ctx, task.OnSuccess(requestDone, task.Close(link.Writer)), responseDone); err != nil {
  128. common.Interrupt(link.Reader)
  129. common.Interrupt(link.Writer)
  130. return newError("connection ends").Base(err)
  131. }
  132. return nil
  133. }