outbound.go 6.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219
  1. // +build !confonly
  2. package outbound
  3. //go:generate errorgen
  4. import (
  5. "context"
  6. "time"
  7. "v2ray.com/core"
  8. "v2ray.com/core/common"
  9. "v2ray.com/core/common/buf"
  10. "v2ray.com/core/common/net"
  11. "v2ray.com/core/common/platform"
  12. "v2ray.com/core/common/protocol"
  13. "v2ray.com/core/common/retry"
  14. "v2ray.com/core/common/session"
  15. "v2ray.com/core/common/signal"
  16. "v2ray.com/core/common/task"
  17. "v2ray.com/core/features/policy"
  18. "v2ray.com/core/proxy/vless"
  19. "v2ray.com/core/proxy/vless/encoding"
  20. "v2ray.com/core/transport"
  21. "v2ray.com/core/transport/internet"
  22. "v2ray.com/core/transport/internet/xtls"
  23. )
  24. var (
  25. xtls_show = false
  26. )
  27. func init() {
  28. common.Must(common.RegisterConfig((*Config)(nil), func(ctx context.Context, config interface{}) (interface{}, error) {
  29. return New(ctx, config.(*Config))
  30. }))
  31. const defaultFlagValue = "NOT_DEFINED_AT_ALL"
  32. xtlsShow := platform.NewEnvFlag("v2ray.vless.xtls.show").GetValue(func() string { return defaultFlagValue })
  33. if xtlsShow == "true" {
  34. xtls_show = true
  35. }
  36. }
  37. // Handler is an outbound connection handler for VLess protocol.
  38. type Handler struct {
  39. serverList *protocol.ServerList
  40. serverPicker protocol.ServerPicker
  41. policyManager policy.Manager
  42. }
  43. // New creates a new VLess outbound handler.
  44. func New(ctx context.Context, config *Config) (*Handler, error) {
  45. serverList := protocol.NewServerList()
  46. for _, rec := range config.Vnext {
  47. s, err := protocol.NewServerSpecFromPB(rec)
  48. if err != nil {
  49. return nil, newError("failed to parse server spec").Base(err).AtError()
  50. }
  51. serverList.AddServer(s)
  52. }
  53. v := core.MustFromContext(ctx)
  54. handler := &Handler{
  55. serverList: serverList,
  56. serverPicker: protocol.NewRoundRobinServerPicker(serverList),
  57. policyManager: v.GetFeature(policy.ManagerType()).(policy.Manager),
  58. }
  59. return handler, nil
  60. }
  61. // Process implements proxy.Outbound.Process().
  62. func (h *Handler) Process(ctx context.Context, link *transport.Link, dialer internet.Dialer) error {
  63. var rec *protocol.ServerSpec
  64. var conn internet.Connection
  65. if err := retry.ExponentialBackoff(5, 200).On(func() error {
  66. rec = h.serverPicker.PickServer()
  67. var err error
  68. conn, err = dialer.Dial(ctx, rec.Destination())
  69. if err != nil {
  70. return err
  71. }
  72. return nil
  73. }); err != nil {
  74. return newError("failed to find an available destination").Base(err).AtWarning()
  75. }
  76. defer conn.Close() // nolint: errcheck
  77. iConn := conn
  78. if statConn, ok := iConn.(*internet.StatCouterConnection); ok {
  79. iConn = statConn.Connection
  80. }
  81. outbound := session.OutboundFromContext(ctx)
  82. if outbound == nil || !outbound.Target.IsValid() {
  83. return newError("target not specified").AtError()
  84. }
  85. target := outbound.Target
  86. newError("tunneling request to ", target, " via ", rec.Destination()).AtInfo().WriteToLog(session.ExportIDToError(ctx))
  87. command := protocol.RequestCommandTCP
  88. if target.Network == net.Network_UDP {
  89. command = protocol.RequestCommandUDP
  90. }
  91. if target.Address.Family().IsDomain() && target.Address.Domain() == "v1.mux.cool" {
  92. command = protocol.RequestCommandMux
  93. }
  94. request := &protocol.RequestHeader{
  95. Version: encoding.Version,
  96. User: rec.PickUser(),
  97. Command: command,
  98. Address: target.Address,
  99. Port: target.Port,
  100. }
  101. account := request.User.Account.(*vless.MemoryAccount)
  102. requestAddons := &encoding.Addons{
  103. Flow: account.Flow,
  104. }
  105. switch requestAddons.Flow {
  106. case vless.XRO, vless.XRO + "-udp443":
  107. switch request.Command {
  108. case protocol.RequestCommandMux:
  109. return newError(vless.XRO + " doesn't support Mux").AtWarning()
  110. case protocol.RequestCommandUDP:
  111. if requestAddons.Flow == vless.XRO && request.Port == 443 {
  112. return newError(vless.XRO + " stopped UDP/443").AtWarning()
  113. }
  114. requestAddons.Flow = ""
  115. case protocol.RequestCommandTCP:
  116. if xtlsConn, ok := iConn.(*xtls.Conn); ok {
  117. xtlsConn.RPRX = true
  118. xtlsConn.SHOW = xtls_show
  119. xtlsConn.MARK = "XTLS"
  120. } else {
  121. return newError(`failed to use ` + vless.XRO + `, maybe "security" is not "xtls"`).AtWarning()
  122. }
  123. requestAddons.Flow = vless.XRO
  124. }
  125. default:
  126. if _, ok := iConn.(*xtls.Conn); ok {
  127. panic(`To avoid misunderstanding, you must fill in VLESS "flow" when using XTLS.`)
  128. }
  129. }
  130. sessionPolicy := h.policyManager.ForLevel(request.User.Level)
  131. ctx, cancel := context.WithCancel(ctx)
  132. timer := signal.CancelAfterInactivity(ctx, cancel, sessionPolicy.Timeouts.ConnectionIdle)
  133. clientReader := link.Reader // .(*pipe.Reader)
  134. clientWriter := link.Writer // .(*pipe.Writer)
  135. postRequest := func() error {
  136. defer timer.SetTimeout(sessionPolicy.Timeouts.DownlinkOnly)
  137. bufferWriter := buf.NewBufferedWriter(buf.NewWriter(conn))
  138. if err := encoding.EncodeRequestHeader(bufferWriter, request, requestAddons); err != nil {
  139. return newError("failed to encode request header").Base(err).AtWarning()
  140. }
  141. // default: serverWriter := bufferWriter
  142. serverWriter := encoding.EncodeBodyAddons(bufferWriter, request, requestAddons)
  143. if err := buf.CopyOnceTimeout(clientReader, serverWriter, time.Millisecond*100); err != nil && err != buf.ErrNotTimeoutReader && err != buf.ErrReadTimeout {
  144. return err // ...
  145. }
  146. // Flush; bufferWriter.WriteMultiBufer now is bufferWriter.writer.WriteMultiBuffer
  147. if err := bufferWriter.SetBuffered(false); err != nil {
  148. return newError("failed to write A request payload").Base(err).AtWarning()
  149. }
  150. // from clientReader.ReadMultiBuffer to serverWriter.WriteMultiBufer
  151. if err := buf.Copy(clientReader, serverWriter, buf.UpdateActivity(timer)); err != nil {
  152. return newError("failed to transfer request payload").Base(err).AtInfo()
  153. }
  154. // Indicates the end of request payload.
  155. switch requestAddons.Flow {
  156. default:
  157. }
  158. return nil
  159. }
  160. getResponse := func() error {
  161. defer timer.SetTimeout(sessionPolicy.Timeouts.UplinkOnly)
  162. responseAddons, err := encoding.DecodeResponseHeader(conn, request)
  163. if err != nil {
  164. return newError("failed to decode response header").Base(err).AtWarning()
  165. }
  166. // default: serverReader := buf.NewReader(conn)
  167. serverReader := encoding.DecodeBodyAddons(conn, request, responseAddons)
  168. // from serverReader.ReadMultiBuffer to clientWriter.WriteMultiBufer
  169. if err := buf.Copy(serverReader, clientWriter, buf.UpdateActivity(timer)); err != nil {
  170. return newError("failed to transfer response payload").Base(err).AtInfo()
  171. }
  172. return nil
  173. }
  174. if err := task.Run(ctx, postRequest, task.OnSuccess(getResponse, task.Close(clientWriter))); err != nil {
  175. return newError("connection ends").Base(err).AtInfo()
  176. }
  177. return nil
  178. }