| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384 |
- package tls
- import (
- "context"
- "crypto/tls"
- "v2ray.com/core/common/net"
- "v2ray.com/core/transport/internet"
- )
- var (
- globalSessionCache = tls.NewLRUClientSessionCache(128)
- )
- func (c *Config) BuildCertificates() []tls.Certificate {
- certs := make([]tls.Certificate, 0, len(c.Certificate))
- for _, entry := range c.Certificate {
- keyPair, err := tls.X509KeyPair(entry.Certificate, entry.Key)
- if err != nil {
- newError("ignoring invalid X509 key pair").Base(err).AtWarning().WriteToLog()
- continue
- }
- certs = append(certs, keyPair)
- }
- return certs
- }
- func (c *Config) GetTLSConfig(opts ...Option) *tls.Config {
- config := &tls.Config{
- ClientSessionCache: globalSessionCache,
- }
- if c == nil {
- return config
- }
- for _, opt := range opts {
- opt(config)
- }
- config.InsecureSkipVerify = c.AllowInsecure
- config.Certificates = c.BuildCertificates()
- config.BuildNameToCertificate()
- if len(c.ServerName) > 0 {
- config.ServerName = c.ServerName
- }
- if len(c.NextProtocol) > 0 {
- config.NextProtos = c.NextProtocol
- }
- if len(config.NextProtos) == 0 {
- config.NextProtos = []string{"http/1.1"}
- }
- return config
- }
- type Option func(*tls.Config)
- func WithDestination(dest net.Destination) Option {
- return func(config *tls.Config) {
- if dest.Address.Family().IsDomain() && len(config.ServerName) == 0 {
- config.ServerName = dest.Address.Domain()
- }
- }
- }
- func WithNextProto(protocol ...string) Option {
- return func(config *tls.Config) {
- if len(config.NextProtos) == 0 {
- config.NextProtos = protocol
- }
- }
- }
- func ConfigFromContext(ctx context.Context) *Config {
- securitySettings := internet.SecuritySettingsFromContext(ctx)
- if securitySettings == nil {
- return nil
- }
- config, ok := securitySettings.(*Config)
- if !ok {
- return nil
- }
- return config
- }
|