server.go 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160
  1. package mtproto
  2. import (
  3. "context"
  4. "time"
  5. "v2ray.com/core"
  6. "v2ray.com/core/common"
  7. "v2ray.com/core/common/buf"
  8. "v2ray.com/core/common/compare"
  9. "v2ray.com/core/common/crypto"
  10. "v2ray.com/core/common/net"
  11. "v2ray.com/core/common/protocol"
  12. "v2ray.com/core/common/session"
  13. "v2ray.com/core/common/signal"
  14. "v2ray.com/core/common/task"
  15. "v2ray.com/core/features/policy"
  16. "v2ray.com/core/features/routing"
  17. "v2ray.com/core/transport/internet"
  18. "v2ray.com/core/transport/pipe"
  19. )
  20. var (
  21. dcList = []net.Address{
  22. net.ParseAddress("149.154.175.50"),
  23. net.ParseAddress("149.154.167.51"),
  24. net.ParseAddress("149.154.175.100"),
  25. net.ParseAddress("149.154.167.91"),
  26. net.ParseAddress("149.154.171.5"),
  27. }
  28. )
  29. type Server struct {
  30. user *protocol.User
  31. account *Account
  32. policy policy.Manager
  33. }
  34. func NewServer(ctx context.Context, config *ServerConfig) (*Server, error) {
  35. if len(config.User) == 0 {
  36. return nil, newError("no user configured.")
  37. }
  38. user := config.User[0]
  39. rawAccount, err := config.User[0].GetTypedAccount()
  40. if err != nil {
  41. return nil, newError("invalid account").Base(err)
  42. }
  43. account, ok := rawAccount.(*Account)
  44. if !ok {
  45. return nil, newError("not a MTProto account")
  46. }
  47. v := core.MustFromContext(ctx)
  48. return &Server{
  49. user: user,
  50. account: account,
  51. policy: v.PolicyManager(),
  52. }, nil
  53. }
  54. func (s *Server) Network() net.NetworkList {
  55. return net.NetworkList{
  56. Network: []net.Network{net.Network_TCP},
  57. }
  58. }
  59. func isValidConnectionType(c [4]byte) bool {
  60. if compare.BytesAll(c[:], 0xef) {
  61. return true
  62. }
  63. if compare.BytesAll(c[:], 0xee) {
  64. return true
  65. }
  66. return false
  67. }
  68. func (s *Server) Process(ctx context.Context, network net.Network, conn internet.Connection, dispatcher routing.Dispatcher) error {
  69. sPolicy := s.policy.ForLevel(s.user.Level)
  70. if err := conn.SetDeadline(time.Now().Add(sPolicy.Timeouts.Handshake)); err != nil {
  71. newError("failed to set deadline").Base(err).WriteToLog(session.ExportIDToError(ctx))
  72. }
  73. auth, err := ReadAuthentication(conn)
  74. if err != nil {
  75. return newError("failed to read authentication header").Base(err)
  76. }
  77. defer putAuthenticationObject(auth)
  78. if err := conn.SetDeadline(time.Time{}); err != nil {
  79. newError("failed to clear deadline").Base(err).WriteToLog(session.ExportIDToError(ctx))
  80. }
  81. auth.ApplySecret(s.account.Secret)
  82. decryptor := crypto.NewAesCTRStream(auth.DecodingKey[:], auth.DecodingNonce[:])
  83. decryptor.XORKeyStream(auth.Header[:], auth.Header[:])
  84. ct := auth.ConnectionType()
  85. if !isValidConnectionType(ct) {
  86. return newError("invalid connection type: ", ct)
  87. }
  88. dcID := auth.DataCenterID()
  89. if dcID >= uint16(len(dcList)) {
  90. return newError("invalid datacenter id: ", dcID)
  91. }
  92. dest := net.Destination{
  93. Network: net.Network_TCP,
  94. Address: dcList[dcID],
  95. Port: net.Port(443),
  96. }
  97. ctx, cancel := context.WithCancel(ctx)
  98. timer := signal.CancelAfterInactivity(ctx, cancel, sPolicy.Timeouts.ConnectionIdle)
  99. ctx = policy.ContextWithBufferPolicy(ctx, sPolicy.Buffer)
  100. sc := SessionContext{
  101. ConnectionType: ct,
  102. DataCenterID: dcID,
  103. }
  104. ctx = ContextWithSessionContext(ctx, sc)
  105. link, err := dispatcher.Dispatch(ctx, dest)
  106. if err != nil {
  107. return newError("failed to dispatch request to: ", dest).Base(err)
  108. }
  109. request := func() error {
  110. defer timer.SetTimeout(sPolicy.Timeouts.DownlinkOnly)
  111. reader := buf.NewReader(crypto.NewCryptionReader(decryptor, conn))
  112. return buf.Copy(reader, link.Writer, buf.UpdateActivity(timer))
  113. }
  114. response := func() error {
  115. defer timer.SetTimeout(sPolicy.Timeouts.UplinkOnly)
  116. encryptor := crypto.NewAesCTRStream(auth.EncodingKey[:], auth.EncodingNonce[:])
  117. writer := buf.NewWriter(crypto.NewCryptionWriter(encryptor, conn))
  118. return buf.Copy(link.Reader, writer, buf.UpdateActivity(timer))
  119. }
  120. var responseDoneAndCloseWriter = task.Single(response, task.OnSuccess(task.Close(link.Writer)))
  121. if err := task.Run(task.WithContext(ctx), task.Parallel(request, responseDoneAndCloseWriter))(); err != nil {
  122. pipe.CloseError(link.Reader)
  123. pipe.CloseError(link.Writer)
  124. return newError("connection ends").Base(err)
  125. }
  126. return nil
  127. }
  128. func init() {
  129. common.Must(common.RegisterConfig((*ServerConfig)(nil), func(ctx context.Context, config interface{}) (interface{}, error) {
  130. return NewServer(ctx, config.(*ServerConfig))
  131. }))
  132. }