outbound.go 6.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222
  1. // +build !confonly
  2. package outbound
  3. //go:generate go run v2ray.com/core/common/errors/errorgen
  4. import (
  5. "context"
  6. "time"
  7. "v2ray.com/core"
  8. "v2ray.com/core/common"
  9. "v2ray.com/core/common/buf"
  10. "v2ray.com/core/common/net"
  11. "v2ray.com/core/common/platform"
  12. "v2ray.com/core/common/protocol"
  13. "v2ray.com/core/common/retry"
  14. "v2ray.com/core/common/session"
  15. "v2ray.com/core/common/signal"
  16. "v2ray.com/core/common/task"
  17. "v2ray.com/core/features/policy"
  18. "v2ray.com/core/proxy/vless"
  19. "v2ray.com/core/proxy/vless/encoding"
  20. "v2ray.com/core/transport"
  21. "v2ray.com/core/transport/internet"
  22. "v2ray.com/core/transport/internet/xtls"
  23. )
  24. var (
  25. xtls_show = false
  26. )
  27. func init() {
  28. common.Must(common.RegisterConfig((*Config)(nil), func(ctx context.Context, config interface{}) (interface{}, error) {
  29. return New(ctx, config.(*Config))
  30. }))
  31. const defaultFlagValue = "NOT_DEFINED_AT_ALL"
  32. xtlsShow := platform.NewEnvFlag("v2ray.vless.xtls.show").GetValue(func() string { return defaultFlagValue })
  33. if xtlsShow == "true" {
  34. xtls_show = true
  35. }
  36. }
  37. // Handler is an outbound connection handler for VLess protocol.
  38. type Handler struct {
  39. serverList *protocol.ServerList
  40. serverPicker protocol.ServerPicker
  41. policyManager policy.Manager
  42. }
  43. // New creates a new VLess outbound handler.
  44. func New(ctx context.Context, config *Config) (*Handler, error) {
  45. serverList := protocol.NewServerList()
  46. for _, rec := range config.Vnext {
  47. s, err := protocol.NewServerSpecFromPB(rec)
  48. if err != nil {
  49. return nil, newError("failed to parse server spec").Base(err).AtError()
  50. }
  51. serverList.AddServer(s)
  52. }
  53. v := core.MustFromContext(ctx)
  54. handler := &Handler{
  55. serverList: serverList,
  56. serverPicker: protocol.NewRoundRobinServerPicker(serverList),
  57. policyManager: v.GetFeature(policy.ManagerType()).(policy.Manager),
  58. }
  59. return handler, nil
  60. }
  61. // Process implements proxy.Outbound.Process().
  62. func (h *Handler) Process(ctx context.Context, link *transport.Link, dialer internet.Dialer) error {
  63. var rec *protocol.ServerSpec
  64. var conn internet.Connection
  65. if err := retry.ExponentialBackoff(5, 200).On(func() error {
  66. rec = h.serverPicker.PickServer()
  67. var err error
  68. conn, err = dialer.Dial(ctx, rec.Destination())
  69. if err != nil {
  70. return err
  71. }
  72. return nil
  73. }); err != nil {
  74. return newError("failed to find an available destination").Base(err).AtWarning()
  75. }
  76. defer conn.Close()
  77. iConn := conn
  78. if statConn, ok := iConn.(*internet.StatCouterConnection); ok {
  79. iConn = statConn.Connection
  80. }
  81. outbound := session.OutboundFromContext(ctx)
  82. if outbound == nil || !outbound.Target.IsValid() {
  83. return newError("target not specified").AtError()
  84. }
  85. target := outbound.Target
  86. newError("tunneling request to ", target, " via ", rec.Destination()).AtInfo().WriteToLog(session.ExportIDToError(ctx))
  87. command := protocol.RequestCommandTCP
  88. if target.Network == net.Network_UDP {
  89. command = protocol.RequestCommandUDP
  90. }
  91. if target.Address.Family().IsDomain() && target.Address.Domain() == "v1.mux.cool" {
  92. command = protocol.RequestCommandMux
  93. }
  94. request := &protocol.RequestHeader{
  95. Version: encoding.Version,
  96. User: rec.PickUser(),
  97. Command: command,
  98. Address: target.Address,
  99. Port: target.Port,
  100. }
  101. account := request.User.Account.(*vless.MemoryAccount)
  102. requestAddons := &encoding.Addons{
  103. Flow: account.Flow,
  104. }
  105. allowUDP443 := false
  106. switch requestAddons.Flow {
  107. case vless.XRO + "-udp443", vless.XRD + "-udp443":
  108. allowUDP443 = true
  109. requestAddons.Flow = requestAddons.Flow[:16]
  110. fallthrough
  111. case vless.XRO, vless.XRD:
  112. switch request.Command {
  113. case protocol.RequestCommandMux:
  114. return newError(requestAddons.Flow + " doesn't support Mux").AtWarning()
  115. case protocol.RequestCommandUDP:
  116. if !allowUDP443 && request.Port == 443 {
  117. return newError(requestAddons.Flow + " stopped UDP/443").AtInfo()
  118. }
  119. requestAddons.Flow = ""
  120. case protocol.RequestCommandTCP:
  121. if xtlsConn, ok := iConn.(*xtls.Conn); ok {
  122. xtlsConn.RPRX = true
  123. xtlsConn.SHOW = xtls_show
  124. xtlsConn.MARK = "XTLS"
  125. if requestAddons.Flow == vless.XRD {
  126. xtlsConn.DirectMode = true
  127. }
  128. } else {
  129. return newError(`failed to use ` + requestAddons.Flow + `, maybe "security" is not "xtls"`).AtWarning()
  130. }
  131. }
  132. default:
  133. if _, ok := iConn.(*xtls.Conn); ok {
  134. panic(`To avoid misunderstanding, you must fill in VLESS "flow" when using XTLS.`)
  135. }
  136. }
  137. sessionPolicy := h.policyManager.ForLevel(request.User.Level)
  138. ctx, cancel := context.WithCancel(ctx)
  139. timer := signal.CancelAfterInactivity(ctx, cancel, sessionPolicy.Timeouts.ConnectionIdle)
  140. clientReader := link.Reader // .(*pipe.Reader)
  141. clientWriter := link.Writer // .(*pipe.Writer)
  142. postRequest := func() error {
  143. defer timer.SetTimeout(sessionPolicy.Timeouts.DownlinkOnly)
  144. bufferWriter := buf.NewBufferedWriter(buf.NewWriter(conn))
  145. if err := encoding.EncodeRequestHeader(bufferWriter, request, requestAddons); err != nil {
  146. return newError("failed to encode request header").Base(err).AtWarning()
  147. }
  148. // default: serverWriter := bufferWriter
  149. serverWriter := encoding.EncodeBodyAddons(bufferWriter, request, requestAddons)
  150. if err := buf.CopyOnceTimeout(clientReader, serverWriter, time.Millisecond*100); err != nil && err != buf.ErrNotTimeoutReader && err != buf.ErrReadTimeout {
  151. return err // ...
  152. }
  153. // Flush; bufferWriter.WriteMultiBufer now is bufferWriter.writer.WriteMultiBuffer
  154. if err := bufferWriter.SetBuffered(false); err != nil {
  155. return newError("failed to write A request payload").Base(err).AtWarning()
  156. }
  157. // from clientReader.ReadMultiBuffer to serverWriter.WriteMultiBufer
  158. if err := buf.Copy(clientReader, serverWriter, buf.UpdateActivity(timer)); err != nil {
  159. return newError("failed to transfer request payload").Base(err).AtInfo()
  160. }
  161. // Indicates the end of request payload.
  162. switch requestAddons.Flow {
  163. default:
  164. }
  165. return nil
  166. }
  167. getResponse := func() error {
  168. defer timer.SetTimeout(sessionPolicy.Timeouts.UplinkOnly)
  169. responseAddons, err := encoding.DecodeResponseHeader(conn, request)
  170. if err != nil {
  171. return newError("failed to decode response header").Base(err).AtWarning()
  172. }
  173. // default: serverReader := buf.NewReader(conn)
  174. serverReader := encoding.DecodeBodyAddons(conn, request, responseAddons)
  175. // from serverReader.ReadMultiBuffer to clientWriter.WriteMultiBufer
  176. if err := buf.Copy(serverReader, clientWriter, buf.UpdateActivity(timer)); err != nil {
  177. return newError("failed to transfer response payload").Base(err).AtInfo()
  178. }
  179. return nil
  180. }
  181. if err := task.Run(ctx, postRequest, task.OnSuccess(getResponse, task.Close(clientWriter))); err != nil {
  182. return newError("connection ends").Base(err).AtInfo()
  183. }
  184. return nil
  185. }