inbound.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467
  1. // +build !confonly
  2. package inbound
  3. //go:generate errorgen
  4. import (
  5. "context"
  6. "encoding/hex"
  7. "io"
  8. "strconv"
  9. "time"
  10. "v2ray.com/core"
  11. "v2ray.com/core/common"
  12. "v2ray.com/core/common/buf"
  13. "v2ray.com/core/common/errors"
  14. "v2ray.com/core/common/log"
  15. "v2ray.com/core/common/net"
  16. "v2ray.com/core/common/protocol"
  17. "v2ray.com/core/common/retry"
  18. "v2ray.com/core/common/session"
  19. "v2ray.com/core/common/signal"
  20. "v2ray.com/core/common/task"
  21. "v2ray.com/core/features/dns"
  22. feature_inbound "v2ray.com/core/features/inbound"
  23. "v2ray.com/core/features/policy"
  24. "v2ray.com/core/features/routing"
  25. "v2ray.com/core/proxy/vless"
  26. "v2ray.com/core/proxy/vless/encoding"
  27. "v2ray.com/core/transport/internet"
  28. "v2ray.com/core/transport/internet/tls"
  29. )
  30. func init() {
  31. common.Must(common.RegisterConfig((*Config)(nil), func(ctx context.Context, config interface{}) (interface{}, error) {
  32. var dc dns.Client
  33. if err := core.RequireFeatures(ctx, func(d dns.Client) error {
  34. dc = d
  35. return nil
  36. }); err != nil {
  37. return nil, err
  38. }
  39. return New(ctx, config.(*Config), dc)
  40. }))
  41. }
  42. // Handler is an inbound connection handler that handles messages in VLess protocol.
  43. type Handler struct {
  44. inboundHandlerManager feature_inbound.Manager
  45. policyManager policy.Manager
  46. validator *vless.Validator
  47. dns dns.Client
  48. fallbacks map[string]map[string]*Fallback // or nil
  49. //regexps map[string]*regexp.Regexp // or nil
  50. }
  51. // New creates a new VLess inbound handler.
  52. func New(ctx context.Context, config *Config, dc dns.Client) (*Handler, error) {
  53. v := core.MustFromContext(ctx)
  54. handler := &Handler{
  55. inboundHandlerManager: v.GetFeature(feature_inbound.ManagerType()).(feature_inbound.Manager),
  56. policyManager: v.GetFeature(policy.ManagerType()).(policy.Manager),
  57. validator: new(vless.Validator),
  58. dns: dc,
  59. }
  60. for _, user := range config.Clients {
  61. u, err := user.ToMemoryUser()
  62. if err != nil {
  63. return nil, newError("failed to get VLESS user").Base(err).AtError()
  64. }
  65. if err := handler.AddUser(ctx, u); err != nil {
  66. return nil, newError("failed to initiate user").Base(err).AtError()
  67. }
  68. }
  69. if config.Fallbacks != nil {
  70. handler.fallbacks = make(map[string]map[string]*Fallback)
  71. //handler.regexps = make(map[string]*regexp.Regexp)
  72. for _, fb := range config.Fallbacks {
  73. if handler.fallbacks[fb.Alpn] == nil {
  74. handler.fallbacks[fb.Alpn] = make(map[string]*Fallback)
  75. }
  76. handler.fallbacks[fb.Alpn][fb.Path] = fb
  77. /*
  78. if fb.Path != "" {
  79. if r, err := regexp.Compile(fb.Path); err != nil {
  80. return nil, newError("invalid path regexp").Base(err).AtError()
  81. } else {
  82. handler.regexps[fb.Path] = r
  83. }
  84. }
  85. */
  86. }
  87. if handler.fallbacks[""] != nil {
  88. for alpn, pfb := range handler.fallbacks {
  89. if alpn != "" { // && alpn != "h2" {
  90. for path, fb := range handler.fallbacks[""] {
  91. if pfb[path] == nil {
  92. pfb[path] = fb
  93. }
  94. }
  95. }
  96. }
  97. }
  98. }
  99. return handler, nil
  100. }
  101. // Close implements common.Closable.Close().
  102. func (h *Handler) Close() error {
  103. return errors.Combine(common.Close(h.validator))
  104. }
  105. // AddUser implements proxy.UserManager.AddUser().
  106. func (h *Handler) AddUser(ctx context.Context, u *protocol.MemoryUser) error {
  107. return h.validator.Add(u)
  108. }
  109. // RemoveUser implements proxy.UserManager.RemoveUser().
  110. func (h *Handler) RemoveUser(ctx context.Context, e string) error {
  111. return h.validator.Del(e)
  112. }
  113. // Network implements proxy.Inbound.Network().
  114. func (*Handler) Network() []net.Network {
  115. return []net.Network{net.Network_TCP}
  116. }
  117. // Process implements proxy.Inbound.Process().
  118. func (h *Handler) Process(ctx context.Context, network net.Network, connection internet.Connection, dispatcher routing.Dispatcher) error {
  119. sid := session.ExportIDToError(ctx)
  120. sessionPolicy := h.policyManager.ForLevel(0)
  121. if err := connection.SetReadDeadline(time.Now().Add(sessionPolicy.Timeouts.Handshake)); err != nil {
  122. return newError("unable to set read deadline").Base(err).AtWarning()
  123. }
  124. first := buf.New()
  125. first.ReadFrom(connection)
  126. firstLen := first.Len()
  127. newError("firstLen = ", firstLen).AtInfo().WriteToLog(sid)
  128. reader := &buf.BufferedReader{
  129. Reader: buf.NewReader(connection),
  130. Buffer: buf.MultiBuffer{first},
  131. }
  132. var request *protocol.RequestHeader
  133. var requestAddons *encoding.Addons
  134. var err error
  135. var pre *buf.Buffer
  136. isfb := false
  137. apfb := h.fallbacks
  138. if apfb != nil {
  139. isfb = true
  140. }
  141. if isfb && firstLen < 18 {
  142. err = newError("fallback directly")
  143. } else {
  144. request, requestAddons, err, pre = encoding.DecodeRequestHeader(reader, h.validator)
  145. if pre == nil {
  146. isfb = false
  147. }
  148. }
  149. if err != nil {
  150. if isfb {
  151. if err := connection.SetReadDeadline(time.Time{}); err != nil {
  152. newError("unable to set back read deadline").Base(err).AtWarning().WriteToLog(sid)
  153. }
  154. newError("fallback starts").Base(err).AtInfo().WriteToLog(sid)
  155. alpn := ""
  156. if len(apfb) > 1 || apfb[""] == nil {
  157. iConn := connection
  158. if statConn, ok := iConn.(*internet.StatCouterConnection); ok {
  159. iConn = statConn.Connection
  160. }
  161. if tlsConn, ok := iConn.(*tls.Conn); ok {
  162. alpn = tlsConn.ConnectionState().NegotiatedProtocol
  163. newError("realAlpn = " + alpn).AtInfo().WriteToLog(sid)
  164. if apfb[alpn] == nil {
  165. alpn = ""
  166. }
  167. }
  168. }
  169. pfb := apfb[alpn]
  170. if pfb == nil {
  171. return newError(`failed to find the default "alpn" config`).AtWarning()
  172. }
  173. path := ""
  174. if len(pfb) > 1 || pfb[""] == nil {
  175. /*
  176. if lines := bytes.Split(firstBytes, []byte{'\r', '\n'}); len(lines) > 1 {
  177. if s := bytes.Split(lines[0], []byte{' '}); len(s) == 3 {
  178. if len(s[0]) < 8 && len(s[1]) > 0 && len(s[2]) == 8 {
  179. newError("realPath = " + string(s[1])).AtInfo().WriteToLog(sid)
  180. for _, fb := range pfb {
  181. if fb.Path != "" && h.regexps[fb.Path].Match(s[1]) {
  182. path = fb.Path
  183. break
  184. }
  185. }
  186. }
  187. }
  188. }
  189. */
  190. if pre != nil && pre.Len() == 1 && first.Byte(3) != '*' { // firstLen >= 18 && invalid request version && not h2c
  191. firstBytes := first.Bytes()
  192. for i := 3; i <= 7; i++ { // 5 -> 9
  193. if firstBytes[i] == '/' && firstBytes[i-1] == ' ' {
  194. search := len(firstBytes)
  195. if search > 64 {
  196. search = 64 // up to 60
  197. }
  198. for j := i + 1; j < search; j++ {
  199. k := firstBytes[j]
  200. if k == '\r' || k == '\n' { // avoid logging \r or \n
  201. break
  202. }
  203. if k == ' ' {
  204. path = string(firstBytes[i:j])
  205. newError("realPath = " + path).AtInfo().WriteToLog(sid)
  206. if pfb[path] == nil {
  207. path = ""
  208. }
  209. break
  210. }
  211. }
  212. break
  213. }
  214. }
  215. }
  216. }
  217. fb := pfb[path]
  218. if fb == nil {
  219. return newError(`failed to find the default "path" config`).AtWarning()
  220. }
  221. ctx, cancel := context.WithCancel(ctx)
  222. timer := signal.CancelAfterInactivity(ctx, cancel, sessionPolicy.Timeouts.ConnectionIdle)
  223. ctx = policy.ContextWithBufferPolicy(ctx, sessionPolicy.Buffer)
  224. var conn net.Conn
  225. if err := retry.ExponentialBackoff(5, 100).On(func() error {
  226. var dialer net.Dialer
  227. conn, err = dialer.DialContext(ctx, fb.Type, fb.Dest)
  228. if err != nil {
  229. return err
  230. }
  231. return nil
  232. }); err != nil {
  233. dest := fb.Dest
  234. if dest[0] == '\x00' {
  235. dest = "@" + dest[1:]
  236. }
  237. return newError("failed to dial to " + dest).Base(err).AtWarning()
  238. }
  239. defer conn.Close() // nolint: errcheck
  240. serverReader := buf.NewReader(conn)
  241. serverWriter := buf.NewWriter(conn)
  242. postRequest := func() error {
  243. defer timer.SetTimeout(sessionPolicy.Timeouts.DownlinkOnly)
  244. if fb.Xver != 0 {
  245. remoteAddr, remotePort, err := net.SplitHostPort(connection.RemoteAddr().String())
  246. if err != nil {
  247. return err
  248. }
  249. localAddr, localPort, err := net.SplitHostPort(connection.LocalAddr().String())
  250. if err != nil {
  251. return err
  252. }
  253. ipv4 := true
  254. for i := 0; i < len(remoteAddr); i++ {
  255. if remoteAddr[i] == ':' {
  256. ipv4 = false
  257. break
  258. }
  259. }
  260. pro := buf.New()
  261. switch fb.Xver {
  262. case 1:
  263. if ipv4 {
  264. pro.Write([]byte("PROXY TCP4 " + remoteAddr + " " + localAddr + " " + remotePort + " " + localPort + "\r\n"))
  265. } else {
  266. pro.Write([]byte("PROXY TCP6 " + remoteAddr + " " + localAddr + " " + remotePort + " " + localPort + "\r\n"))
  267. }
  268. case 2:
  269. pro.Write([]byte("\x0D\x0A\x0D\x0A\x00\x0D\x0A\x51\x55\x49\x54\x0A\x21")) // signature + v2 + PROXY
  270. if ipv4 {
  271. pro.Write([]byte("\x11\x00\x0C")) // AF_INET + STREAM + 12 bytes
  272. pro.Write(net.ParseIP(remoteAddr).To4())
  273. pro.Write(net.ParseIP(localAddr).To4())
  274. } else {
  275. pro.Write([]byte("\x21\x00\x24")) // AF_INET6 + STREAM + 36 bytes
  276. pro.Write(net.ParseIP(remoteAddr).To16())
  277. pro.Write(net.ParseIP(localAddr).To16())
  278. }
  279. p1, _ := strconv.ParseInt(remotePort, 10, 64)
  280. b1, _ := hex.DecodeString(strconv.FormatInt(p1, 16))
  281. p2, _ := strconv.ParseInt(localPort, 10, 64)
  282. b2, _ := hex.DecodeString(strconv.FormatInt(p2, 16))
  283. if len(b1) == 1 {
  284. pro.WriteByte(0)
  285. }
  286. pro.Write(b1)
  287. if len(b2) == 1 {
  288. pro.WriteByte(0)
  289. }
  290. pro.Write(b2)
  291. }
  292. if err := serverWriter.WriteMultiBuffer(buf.MultiBuffer{pro}); err != nil {
  293. return newError("failed to set PROXY protocol v", fb.Xver).Base(err).AtWarning()
  294. }
  295. }
  296. if pre != nil && pre.Len() > 0 {
  297. if err := serverWriter.WriteMultiBuffer(buf.MultiBuffer{pre}); err != nil {
  298. return newError("failed to fallback request pre").Base(err).AtWarning()
  299. }
  300. }
  301. if err := buf.Copy(reader, serverWriter, buf.UpdateActivity(timer)); err != nil {
  302. return newError("failed to fallback request payload").Base(err).AtInfo()
  303. }
  304. return nil
  305. }
  306. writer := buf.NewWriter(connection)
  307. getResponse := func() error {
  308. defer timer.SetTimeout(sessionPolicy.Timeouts.UplinkOnly)
  309. if err := buf.Copy(serverReader, writer, buf.UpdateActivity(timer)); err != nil {
  310. return newError("failed to deliver response payload").Base(err).AtInfo()
  311. }
  312. return nil
  313. }
  314. if err := task.Run(ctx, task.OnSuccess(postRequest, task.Close(serverWriter)), task.OnSuccess(getResponse, task.Close(writer))); err != nil {
  315. common.Interrupt(serverReader)
  316. common.Interrupt(serverWriter)
  317. return newError("fallback ends").Base(err).AtInfo()
  318. }
  319. return nil
  320. }
  321. if errors.Cause(err) != io.EOF {
  322. log.Record(&log.AccessMessage{
  323. From: connection.RemoteAddr(),
  324. To: "",
  325. Status: log.AccessRejected,
  326. Reason: err,
  327. })
  328. err = newError("invalid request from ", connection.RemoteAddr()).Base(err).AtWarning()
  329. }
  330. return err
  331. }
  332. if err := connection.SetReadDeadline(time.Time{}); err != nil {
  333. newError("unable to set back read deadline").Base(err).AtWarning().WriteToLog(sid)
  334. }
  335. newError("received request for ", request.Destination()).AtInfo().WriteToLog(sid)
  336. inbound := session.InboundFromContext(ctx)
  337. if inbound == nil {
  338. panic("no inbound metadata")
  339. }
  340. inbound.User = request.User
  341. if request.Command != protocol.RequestCommandMux {
  342. ctx = log.ContextWithAccessMessage(ctx, &log.AccessMessage{
  343. From: connection.RemoteAddr(),
  344. To: request.Destination(),
  345. Status: log.AccessAccepted,
  346. Reason: "",
  347. Email: request.User.Email,
  348. })
  349. }
  350. sessionPolicy = h.policyManager.ForLevel(request.User.Level)
  351. ctx, cancel := context.WithCancel(ctx)
  352. timer := signal.CancelAfterInactivity(ctx, cancel, sessionPolicy.Timeouts.ConnectionIdle)
  353. ctx = policy.ContextWithBufferPolicy(ctx, sessionPolicy.Buffer)
  354. link, err := dispatcher.Dispatch(ctx, request.Destination())
  355. if err != nil {
  356. return newError("failed to dispatch request to ", request.Destination()).Base(err).AtWarning()
  357. }
  358. serverReader := link.Reader
  359. serverWriter := link.Writer
  360. postRequest := func() error {
  361. defer timer.SetTimeout(sessionPolicy.Timeouts.DownlinkOnly)
  362. // default: clientReader := reader
  363. clientReader := encoding.DecodeBodyAddons(reader, request, requestAddons)
  364. // from clientReader.ReadMultiBuffer to serverWriter.WriteMultiBufer
  365. if err := buf.Copy(clientReader, serverWriter, buf.UpdateActivity(timer)); err != nil {
  366. return newError("failed to transfer request payload").Base(err).AtInfo()
  367. }
  368. return nil
  369. }
  370. getResponse := func() error {
  371. defer timer.SetTimeout(sessionPolicy.Timeouts.UplinkOnly)
  372. responseAddons := &encoding.Addons{
  373. Scheduler: requestAddons.Scheduler,
  374. }
  375. bufferWriter := buf.NewBufferedWriter(buf.NewWriter(connection))
  376. if err := encoding.EncodeResponseHeader(bufferWriter, request, responseAddons); err != nil {
  377. return newError("failed to encode response header").Base(err).AtWarning()
  378. }
  379. // default: clientWriter := bufferWriter
  380. clientWriter := encoding.EncodeBodyAddons(bufferWriter, request, responseAddons)
  381. {
  382. multiBuffer, err := serverReader.ReadMultiBuffer()
  383. if err != nil {
  384. return err // ...
  385. }
  386. if err := clientWriter.WriteMultiBuffer(multiBuffer); err != nil {
  387. return err // ...
  388. }
  389. }
  390. // Flush; bufferWriter.WriteMultiBufer now is bufferWriter.writer.WriteMultiBuffer
  391. if err := bufferWriter.SetBuffered(false); err != nil {
  392. return newError("failed to write A response payload").Base(err).AtWarning()
  393. }
  394. // from serverReader.ReadMultiBuffer to clientWriter.WriteMultiBufer
  395. if err := buf.Copy(serverReader, clientWriter, buf.UpdateActivity(timer)); err != nil {
  396. return newError("failed to transfer response payload").Base(err).AtInfo()
  397. }
  398. // Indicates the end of response payload.
  399. switch responseAddons.Scheduler {
  400. default:
  401. }
  402. return nil
  403. }
  404. if err := task.Run(ctx, task.OnSuccess(postRequest, task.Close(serverWriter)), getResponse); err != nil {
  405. common.Interrupt(serverReader)
  406. common.Interrupt(serverWriter)
  407. return newError("connection ends").Base(err).AtInfo()
  408. }
  409. return nil
  410. }