server.go 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116
  1. package mtproto
  2. import (
  3. "context"
  4. "v2ray.com/core"
  5. "v2ray.com/core/common"
  6. "v2ray.com/core/common/buf"
  7. "v2ray.com/core/common/crypto"
  8. "v2ray.com/core/common/net"
  9. "v2ray.com/core/common/predicate"
  10. "v2ray.com/core/common/protocol"
  11. "v2ray.com/core/common/task"
  12. "v2ray.com/core/transport/internet"
  13. "v2ray.com/core/transport/pipe"
  14. )
  15. var (
  16. dcList = []net.Address{
  17. net.ParseAddress("149.154.175.50"),
  18. net.ParseAddress("149.154.167.51"),
  19. net.ParseAddress("149.154.175.100"),
  20. net.ParseAddress("149.154.167.91"),
  21. net.ParseAddress("149.154.171.5"),
  22. }
  23. )
  24. type Server struct {
  25. user *protocol.User
  26. account *Account
  27. }
  28. func NewServer(ctx context.Context, config *ServerConfig) (*Server, error) {
  29. if len(config.User) == 0 {
  30. return nil, newError("no user configured.")
  31. }
  32. user := config.User[0]
  33. rawAccount, err := config.User[0].GetTypedAccount()
  34. if err != nil {
  35. return nil, newError("invalid account").Base(err)
  36. }
  37. account, ok := rawAccount.(*Account)
  38. if !ok {
  39. return nil, newError("not a MTProto account")
  40. }
  41. return &Server{
  42. user: user,
  43. account: account,
  44. }, nil
  45. }
  46. func (s *Server) Network() net.NetworkList {
  47. return net.NetworkList{
  48. Network: []net.Network{net.Network_TCP},
  49. }
  50. }
  51. func (s *Server) Process(ctx context.Context, network net.Network, conn internet.Connection, dispatcher core.Dispatcher) error {
  52. auth, err := ReadAuthentication(conn)
  53. if err != nil {
  54. return newError("failed to read authentication header").Base(err)
  55. }
  56. defer putAuthenticationObject(auth)
  57. auth.ApplySecret(s.account.Secret)
  58. decryptor := crypto.NewAesCTRStream(auth.DecodingKey[:], auth.DecodingNonce[:])
  59. decryptor.XORKeyStream(auth.Header[:], auth.Header[:])
  60. if !predicate.BytesAll(auth.Header[56:60], 0xef) {
  61. return newError("invalid connection type: ", auth.Header[56:60])
  62. }
  63. dcID := auth.DataCenterID()
  64. if dcID >= uint16(len(dcList)) {
  65. return newError("invalid data center id: ", dcID)
  66. }
  67. dest := net.Destination{
  68. Network: net.Network_TCP,
  69. Address: dcList[dcID],
  70. Port: net.Port(443),
  71. }
  72. link, err := dispatcher.Dispatch(ctx, dest)
  73. if err != nil {
  74. return newError("failed to dispatch request to: ", dest).Base(err)
  75. }
  76. request := func() error {
  77. reader := buf.NewReader(crypto.NewCryptionReader(decryptor, conn))
  78. return buf.Copy(reader, link.Writer)
  79. }
  80. response := func() error {
  81. encryptor := crypto.NewAesCTRStream(auth.EncodingKey[:], auth.EncodingNonce[:])
  82. writer := buf.NewWriter(crypto.NewCryptionWriter(encryptor, conn))
  83. return buf.Copy(link.Reader, writer)
  84. }
  85. var responseDoneAndCloseWriter = task.Single(response, task.OnSuccess(task.Close(link.Writer)))
  86. if err := task.Run(task.WithContext(ctx), task.Parallel(request, responseDoneAndCloseWriter))(); err != nil {
  87. pipe.CloseError(link.Reader)
  88. pipe.CloseError(link.Writer)
  89. return newError("connection ends").Base(err)
  90. }
  91. return nil
  92. }
  93. func init() {
  94. common.Must(common.RegisterConfig((*ServerConfig)(nil), func(ctx context.Context, config interface{}) (interface{}, error) {
  95. return NewServer(ctx, config.(*ServerConfig))
  96. }))
  97. }