| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183 |
- package outbound
- //go:generate go run $GOPATH/src/v2ray.com/core/tools/generrorgen/main.go -pkg outbound -path Proxy,VMess,Outbound
- import (
- "context"
- "time"
- "v2ray.com/core/app"
- "v2ray.com/core/app/log"
- "v2ray.com/core/app/policy"
- "v2ray.com/core/common"
- "v2ray.com/core/common/buf"
- "v2ray.com/core/common/net"
- "v2ray.com/core/common/protocol"
- "v2ray.com/core/common/retry"
- "v2ray.com/core/common/signal"
- "v2ray.com/core/proxy"
- "v2ray.com/core/proxy/vmess"
- "v2ray.com/core/proxy/vmess/encoding"
- "v2ray.com/core/transport/internet"
- "v2ray.com/core/transport/ray"
- )
- // Handler is an outbound connection handler for VMess protocol.
- type Handler struct {
- serverList *protocol.ServerList
- serverPicker protocol.ServerPicker
- policyManager policy.Manager
- }
- func New(ctx context.Context, config *Config) (*Handler, error) {
- space := app.SpaceFromContext(ctx)
- if space == nil {
- return nil, newError("no space in context.")
- }
- serverList := protocol.NewServerList()
- for _, rec := range config.Receiver {
- serverList.AddServer(protocol.NewServerSpecFromPB(*rec))
- }
- handler := &Handler{
- serverList: serverList,
- serverPicker: protocol.NewRoundRobinServerPicker(serverList),
- }
- space.OnInitialize(func() error {
- pm := policy.FromSpace(space)
- if pm == nil {
- return newError("Policy is not found in space.")
- }
- handler.policyManager = pm
- return nil
- })
- return handler, nil
- }
- // Process implements proxy.Outbound.Process().
- func (v *Handler) Process(ctx context.Context, outboundRay ray.OutboundRay, dialer proxy.Dialer) error {
- var rec *protocol.ServerSpec
- var conn internet.Connection
- err := retry.ExponentialBackoff(5, 200).On(func() error {
- rec = v.serverPicker.PickServer()
- rawConn, err := dialer.Dial(ctx, rec.Destination())
- if err != nil {
- return err
- }
- conn = rawConn
- return nil
- })
- if err != nil {
- return newError("failed to find an available destination").Base(err).AtWarning()
- }
- defer conn.Close()
- target, ok := proxy.TargetFromContext(ctx)
- if !ok {
- return newError("target not specified").AtError()
- }
- log.Trace(newError("tunneling request to ", target, " via ", rec.Destination()))
- command := protocol.RequestCommandTCP
- if target.Network == net.Network_UDP {
- command = protocol.RequestCommandUDP
- }
- if target.Address.Family().IsDomain() && target.Address.Domain() == "v1.mux.com" {
- command = protocol.RequestCommandMux
- }
- request := &protocol.RequestHeader{
- Version: encoding.Version,
- User: rec.PickUser(),
- Command: command,
- Address: target.Address,
- Port: target.Port,
- Option: protocol.RequestOptionChunkStream,
- }
- rawAccount, err := request.User.GetTypedAccount()
- if err != nil {
- return newError("failed to get user account").Base(err).AtWarning()
- }
- account := rawAccount.(*vmess.InternalAccount)
- request.Security = account.Security
- if request.Security.Is(protocol.SecurityType_AES128_GCM) || request.Security.Is(protocol.SecurityType_NONE) || request.Security.Is(protocol.SecurityType_CHACHA20_POLY1305) {
- request.Option.Set(protocol.RequestOptionChunkMasking)
- }
- input := outboundRay.OutboundInput()
- output := outboundRay.OutboundOutput()
- session := encoding.NewClientSession(protocol.DefaultIDHash)
- sessionPolicy := v.policyManager.GetPolicy(request.User.Level)
- ctx, cancel := context.WithCancel(ctx)
- timer := signal.CancelAfterInactivity(ctx, cancel, sessionPolicy.Timeout.ConnectionIdle.Duration())
- requestDone := signal.ExecuteAsync(func() error {
- writer := buf.NewBufferedWriter(buf.NewWriter(conn))
- if err := session.EncodeRequestHeader(request, writer); err != nil {
- return newError("failed to encode request").Base(err).AtWarning()
- }
- bodyWriter := session.EncodeRequestBody(request, writer)
- firstPayload, err := input.ReadTimeout(time.Millisecond * 500)
- if err != nil && err != buf.ErrReadTimeout {
- return newError("failed to get first payload").Base(err)
- }
- if !firstPayload.IsEmpty() {
- if err := bodyWriter.WriteMultiBuffer(firstPayload); err != nil {
- return newError("failed to write first payload").Base(err)
- }
- firstPayload.Release()
- }
- if err := writer.SetBuffered(false); err != nil {
- return err
- }
- if err := buf.Copy(input, bodyWriter, buf.UpdateActivity(timer)); err != nil {
- return err
- }
- if request.Option.Has(protocol.RequestOptionChunkStream) {
- if err := bodyWriter.WriteMultiBuffer(buf.MultiBuffer{}); err != nil {
- return err
- }
- }
- timer.SetTimeout(sessionPolicy.Timeout.DownlinkOnly.Duration())
- return nil
- })
- responseDone := signal.ExecuteAsync(func() error {
- defer output.Close()
- defer timer.SetTimeout(sessionPolicy.Timeout.UplinkOnly.Duration())
- reader := buf.NewBufferedReader(buf.NewReader(conn))
- header, err := session.DecodeResponseHeader(reader)
- if err != nil {
- return err
- }
- v.handleCommand(rec.Destination(), header.Command)
- reader.SetBuffered(false)
- bodyReader := session.DecodeResponseBody(request, reader)
- return buf.Copy(bodyReader, output, buf.UpdateActivity(timer))
- })
- if err := signal.ErrorOrFinish2(ctx, requestDone, responseDone); err != nil {
- return newError("connection ends").Base(err)
- }
- return nil
- }
- func init() {
- common.Must(common.RegisterConfig((*Config)(nil), func(ctx context.Context, config interface{}) (interface{}, error) {
- return New(ctx, config.(*Config))
- }))
- }
|