vmessin.go 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156
  1. package vmess
  2. import (
  3. "crypto/md5"
  4. "io"
  5. "net"
  6. "sync"
  7. "github.com/v2ray/v2ray-core"
  8. "github.com/v2ray/v2ray-core/common/alloc"
  9. v2io "github.com/v2ray/v2ray-core/common/io"
  10. "github.com/v2ray/v2ray-core/common/log"
  11. v2net "github.com/v2ray/v2ray-core/common/net"
  12. "github.com/v2ray/v2ray-core/proxy/vmess/protocol"
  13. "github.com/v2ray/v2ray-core/proxy/vmess/protocol/user"
  14. )
  15. type VMessInboundHandler struct {
  16. vPoint *core.Point
  17. clients user.UserSet
  18. accepting bool
  19. udpEnabled bool
  20. }
  21. func NewVMessInboundHandler(vp *core.Point, clients user.UserSet, udpEnabled bool) *VMessInboundHandler {
  22. return &VMessInboundHandler{
  23. vPoint: vp,
  24. clients: clients,
  25. udpEnabled: udpEnabled,
  26. }
  27. }
  28. func (handler *VMessInboundHandler) Listen(port uint16) error {
  29. listener, err := net.ListenTCP("tcp", &net.TCPAddr{
  30. IP: []byte{0, 0, 0, 0},
  31. Port: int(port),
  32. Zone: "",
  33. })
  34. if err != nil {
  35. log.Error("Unable to listen tcp port %d: %v", port, err)
  36. return err
  37. }
  38. handler.accepting = true
  39. go handler.AcceptConnections(listener)
  40. if handler.udpEnabled {
  41. handler.ListenUDP(port)
  42. }
  43. return nil
  44. }
  45. func (handler *VMessInboundHandler) AcceptConnections(listener *net.TCPListener) error {
  46. for handler.accepting {
  47. connection, err := listener.AcceptTCP()
  48. if err != nil {
  49. log.Error("Failed to accpet connection: %s", err.Error())
  50. continue
  51. }
  52. go handler.HandleConnection(connection)
  53. }
  54. return nil
  55. }
  56. func (handler *VMessInboundHandler) HandleConnection(connection *net.TCPConn) error {
  57. defer connection.Close()
  58. connReader := v2net.NewTimeOutReader(120, connection)
  59. requestReader := protocol.NewVMessRequestReader(handler.clients)
  60. request, err := requestReader.Read(connReader)
  61. if err != nil {
  62. log.Access(connection.RemoteAddr().String(), "", log.AccessRejected, err.Error())
  63. log.Warning("VMessIn: Invalid request from (%s): %v", connection.RemoteAddr().String(), err)
  64. return err
  65. }
  66. log.Access(connection.RemoteAddr().String(), request.Address.String(), log.AccessAccepted, "")
  67. log.Debug("VMessIn: Received request for %s", request.Address.String())
  68. ray := handler.vPoint.DispatchToOutbound(v2net.NewPacket(request.Destination(), nil, true))
  69. input := ray.InboundInput()
  70. output := ray.InboundOutput()
  71. var readFinish, writeFinish sync.Mutex
  72. readFinish.Lock()
  73. writeFinish.Lock()
  74. go handleInput(request, connReader, input, &readFinish)
  75. responseKey := md5.Sum(request.RequestKey)
  76. responseIV := md5.Sum(request.RequestIV)
  77. responseWriter, err := v2io.NewAesEncryptWriter(responseKey[:], responseIV[:], connection)
  78. if err != nil {
  79. log.Error("VMessIn: Failed to create encrypt writer: %v", err)
  80. return err
  81. }
  82. // Optimize for small response packet
  83. buffer := alloc.NewLargeBuffer().Clear()
  84. buffer.Append(request.ResponseHeader)
  85. if data, open := <-output; open {
  86. buffer.Append(data.Value)
  87. data.Release()
  88. responseWriter.Write(buffer.Value)
  89. buffer.Release()
  90. go handleOutput(request, responseWriter, output, &writeFinish)
  91. writeFinish.Lock()
  92. }
  93. connection.CloseWrite()
  94. readFinish.Lock()
  95. return nil
  96. }
  97. func handleInput(request *protocol.VMessRequest, reader io.Reader, input chan<- *alloc.Buffer, finish *sync.Mutex) {
  98. defer close(input)
  99. defer finish.Unlock()
  100. requestReader, err := v2io.NewAesDecryptReader(request.RequestKey, request.RequestIV, reader)
  101. if err != nil {
  102. log.Error("VMessIn: Failed to create decrypt reader: %v", err)
  103. return
  104. }
  105. v2net.ReaderToChan(input, requestReader)
  106. }
  107. func handleOutput(request *protocol.VMessRequest, writer io.Writer, output <-chan *alloc.Buffer, finish *sync.Mutex) {
  108. v2net.ChanToWriter(writer, output)
  109. finish.Unlock()
  110. }
  111. type VMessInboundHandlerFactory struct {
  112. }
  113. func (factory *VMessInboundHandlerFactory) Create(vp *core.Point, rawConfig interface{}) (core.InboundConnectionHandler, error) {
  114. config := rawConfig.(*VMessInboundConfig)
  115. allowedClients := user.NewTimedUserSet()
  116. for _, client := range config.AllowedClients {
  117. user, err := client.ToUser()
  118. if err != nil {
  119. log.Error("VMessIn: Failed to parse user id %s: %v", client.Id, err)
  120. return nil, err
  121. }
  122. allowedClients.AddUser(user)
  123. }
  124. return NewVMessInboundHandler(vp, allowedClients, config.UDPEnabled), nil
  125. }
  126. func init() {
  127. core.RegisterInboundConnectionHandlerFactory("vmess", &VMessInboundHandlerFactory{})
  128. }