123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470 |
- package dispatcher
- import (
- "context"
- "regexp"
- "strings"
- "sync"
- "time"
- "github.com/xtls/xray-core/common"
- "github.com/xtls/xray-core/common/buf"
- "github.com/xtls/xray-core/common/errors"
- "github.com/xtls/xray-core/common/log"
- "github.com/xtls/xray-core/common/net"
- "github.com/xtls/xray-core/common/protocol"
- "github.com/xtls/xray-core/common/session"
- "github.com/xtls/xray-core/core"
- "github.com/xtls/xray-core/features/dns"
- "github.com/xtls/xray-core/features/outbound"
- "github.com/xtls/xray-core/features/policy"
- "github.com/xtls/xray-core/features/routing"
- routing_session "github.com/xtls/xray-core/features/routing/session"
- "github.com/xtls/xray-core/features/stats"
- "github.com/xtls/xray-core/transport"
- "github.com/xtls/xray-core/transport/pipe"
- )
- var errSniffingTimeout = errors.New("timeout on sniffing")
- type cachedReader struct {
- sync.Mutex
- reader *pipe.Reader
- cache buf.MultiBuffer
- }
- func (r *cachedReader) Cache(b *buf.Buffer) {
- mb, _ := r.reader.ReadMultiBufferTimeout(time.Millisecond * 100)
- r.Lock()
- if !mb.IsEmpty() {
- r.cache, _ = buf.MergeMulti(r.cache, mb)
- }
- cacheLen := r.cache.Len()
- if cacheLen <= b.Cap() {
- b.Clear()
- } else {
- b.Release()
- *b = *buf.NewWithSize(cacheLen)
- }
- rawBytes := b.Extend(cacheLen)
- n := r.cache.Copy(rawBytes)
- b.Resize(0, int32(n))
- r.Unlock()
- }
- func (r *cachedReader) readInternal() buf.MultiBuffer {
- r.Lock()
- defer r.Unlock()
- if r.cache != nil && !r.cache.IsEmpty() {
- mb := r.cache
- r.cache = nil
- return mb
- }
- return nil
- }
- func (r *cachedReader) ReadMultiBuffer() (buf.MultiBuffer, error) {
- mb := r.readInternal()
- if mb != nil {
- return mb, nil
- }
- return r.reader.ReadMultiBuffer()
- }
- func (r *cachedReader) ReadMultiBufferTimeout(timeout time.Duration) (buf.MultiBuffer, error) {
- mb := r.readInternal()
- if mb != nil {
- return mb, nil
- }
- return r.reader.ReadMultiBufferTimeout(timeout)
- }
- func (r *cachedReader) Interrupt() {
- r.Lock()
- if r.cache != nil {
- r.cache = buf.ReleaseMulti(r.cache)
- }
- r.Unlock()
- r.reader.Interrupt()
- }
- // DefaultDispatcher is a default implementation of Dispatcher.
- type DefaultDispatcher struct {
- ohm outbound.Manager
- router routing.Router
- policy policy.Manager
- stats stats.Manager
- dns dns.Client
- fdns dns.FakeDNSEngine
- }
- func init() {
- common.Must(common.RegisterConfig((*Config)(nil), func(ctx context.Context, config interface{}) (interface{}, error) {
- d := new(DefaultDispatcher)
- if err := core.RequireFeatures(ctx, func(om outbound.Manager, router routing.Router, pm policy.Manager, sm stats.Manager, dc dns.Client) error {
- core.RequireFeatures(ctx, func(fdns dns.FakeDNSEngine) {
- d.fdns = fdns
- })
- return d.Init(config.(*Config), om, router, pm, sm, dc)
- }); err != nil {
- return nil, err
- }
- return d, nil
- }))
- }
- // Init initializes DefaultDispatcher.
- func (d *DefaultDispatcher) Init(config *Config, om outbound.Manager, router routing.Router, pm policy.Manager, sm stats.Manager, dns dns.Client) error {
- d.ohm = om
- d.router = router
- d.policy = pm
- d.stats = sm
- d.dns = dns
- return nil
- }
- // Type implements common.HasType.
- func (*DefaultDispatcher) Type() interface{} {
- return routing.DispatcherType()
- }
- // Start implements common.Runnable.
- func (*DefaultDispatcher) Start() error {
- return nil
- }
- // Close implements common.Closable.
- func (*DefaultDispatcher) Close() error { return nil }
- func (d *DefaultDispatcher) getLink(ctx context.Context) (*transport.Link, *transport.Link) {
- opt := pipe.OptionsFromContext(ctx)
- uplinkReader, uplinkWriter := pipe.New(opt...)
- downlinkReader, downlinkWriter := pipe.New(opt...)
- inboundLink := &transport.Link{
- Reader: downlinkReader,
- Writer: uplinkWriter,
- }
- outboundLink := &transport.Link{
- Reader: uplinkReader,
- Writer: downlinkWriter,
- }
- sessionInbound := session.InboundFromContext(ctx)
- var user *protocol.MemoryUser
- if sessionInbound != nil {
- user = sessionInbound.User
- }
- if user != nil && len(user.Email) > 0 {
- p := d.policy.ForLevel(user.Level)
- if p.Stats.UserUplink {
- name := "user>>>" + user.Email + ">>>traffic>>>uplink"
- if c, _ := stats.GetOrRegisterCounter(d.stats, name); c != nil {
- inboundLink.Writer = &SizeStatWriter{
- Counter: c,
- Writer: inboundLink.Writer,
- }
- }
- }
- if p.Stats.UserDownlink {
- name := "user>>>" + user.Email + ">>>traffic>>>downlink"
- if c, _ := stats.GetOrRegisterCounter(d.stats, name); c != nil {
- outboundLink.Writer = &SizeStatWriter{
- Counter: c,
- Writer: outboundLink.Writer,
- }
- }
- }
- }
- return inboundLink, outboundLink
- }
- func (d *DefaultDispatcher) shouldOverride(ctx context.Context, result SniffResult, request session.SniffingRequest, destination net.Destination) bool {
- domain := result.Domain()
- if domain == "" {
- return false
- }
- for _, d := range request.ExcludeForDomain {
- if strings.HasPrefix(d, "regexp:") {
- pattern := d[7:]
- re, err := regexp.Compile(pattern)
- if err != nil {
- errors.LogInfo(ctx, "Unable to compile regex")
- continue
- }
- if re.MatchString(domain) {
- return false
- }
- } else {
- if strings.ToLower(domain) == d {
- return false
- }
- }
- }
- protocolString := result.Protocol()
- if resComp, ok := result.(SnifferResultComposite); ok {
- protocolString = resComp.ProtocolForDomainResult()
- }
- for _, p := range request.OverrideDestinationForProtocol {
- if strings.HasPrefix(protocolString, p) || strings.HasPrefix(p, protocolString) {
- return true
- }
- if fkr0, ok := d.fdns.(dns.FakeDNSEngineRev0); ok && protocolString != "bittorrent" && p == "fakedns" &&
- fkr0.IsIPInIPPool(destination.Address) {
- errors.LogInfo(ctx, "Using sniffer ", protocolString, " since the fake DNS missed")
- return true
- }
- if resultSubset, ok := result.(SnifferIsProtoSubsetOf); ok {
- if resultSubset.IsProtoSubsetOf(p) {
- return true
- }
- }
- }
- return false
- }
- // Dispatch implements routing.Dispatcher.
- func (d *DefaultDispatcher) Dispatch(ctx context.Context, destination net.Destination) (*transport.Link, error) {
- if !destination.IsValid() {
- panic("Dispatcher: Invalid destination.")
- }
- outbounds := session.OutboundsFromContext(ctx)
- if len(outbounds) == 0 {
- outbounds = []*session.Outbound{{}}
- ctx = session.ContextWithOutbounds(ctx, outbounds)
- }
- ob := outbounds[len(outbounds)-1]
- ob.OriginalTarget = destination
- ob.Target = destination
- content := session.ContentFromContext(ctx)
- if content == nil {
- content = new(session.Content)
- ctx = session.ContextWithContent(ctx, content)
- }
- sniffingRequest := content.SniffingRequest
- inbound, outbound := d.getLink(ctx)
- if !sniffingRequest.Enabled {
- go d.routedDispatch(ctx, outbound, destination)
- } else {
- go func() {
- cReader := &cachedReader{
- reader: outbound.Reader.(*pipe.Reader),
- }
- outbound.Reader = cReader
- result, err := sniffer(ctx, cReader, sniffingRequest.MetadataOnly, destination.Network)
- if err == nil {
- content.Protocol = result.Protocol()
- }
- if err == nil && d.shouldOverride(ctx, result, sniffingRequest, destination) {
- domain := result.Domain()
- errors.LogInfo(ctx, "sniffed domain: ", domain)
- destination.Address = net.ParseAddress(domain)
- protocol := result.Protocol()
- if resComp, ok := result.(SnifferResultComposite); ok {
- protocol = resComp.ProtocolForDomainResult()
- }
- isFakeIP := false
- if fkr0, ok := d.fdns.(dns.FakeDNSEngineRev0); ok && fkr0.IsIPInIPPool(ob.Target.Address) {
- isFakeIP = true
- }
- if sniffingRequest.RouteOnly && protocol != "fakedns" && protocol != "fakedns+others" && !isFakeIP {
- ob.RouteTarget = destination
- } else {
- ob.Target = destination
- }
- }
- d.routedDispatch(ctx, outbound, destination)
- }()
- }
- return inbound, nil
- }
- // DispatchLink implements routing.Dispatcher.
- func (d *DefaultDispatcher) DispatchLink(ctx context.Context, destination net.Destination, outbound *transport.Link) error {
- if !destination.IsValid() {
- return errors.New("Dispatcher: Invalid destination.")
- }
- outbounds := session.OutboundsFromContext(ctx)
- if len(outbounds) == 0 {
- outbounds = []*session.Outbound{{}}
- ctx = session.ContextWithOutbounds(ctx, outbounds)
- }
- ob := outbounds[len(outbounds)-1]
- ob.OriginalTarget = destination
- ob.Target = destination
- content := session.ContentFromContext(ctx)
- if content == nil {
- content = new(session.Content)
- ctx = session.ContextWithContent(ctx, content)
- }
- sniffingRequest := content.SniffingRequest
- if !sniffingRequest.Enabled {
- d.routedDispatch(ctx, outbound, destination)
- } else {
- cReader := &cachedReader{
- reader: outbound.Reader.(*pipe.Reader),
- }
- outbound.Reader = cReader
- result, err := sniffer(ctx, cReader, sniffingRequest.MetadataOnly, destination.Network)
- if err == nil {
- content.Protocol = result.Protocol()
- }
- if err == nil && d.shouldOverride(ctx, result, sniffingRequest, destination) {
- domain := result.Domain()
- errors.LogInfo(ctx, "sniffed domain: ", domain)
- destination.Address = net.ParseAddress(domain)
- protocol := result.Protocol()
- if resComp, ok := result.(SnifferResultComposite); ok {
- protocol = resComp.ProtocolForDomainResult()
- }
- isFakeIP := false
- if fkr0, ok := d.fdns.(dns.FakeDNSEngineRev0); ok && fkr0.IsIPInIPPool(ob.Target.Address) {
- isFakeIP = true
- }
- if sniffingRequest.RouteOnly && protocol != "fakedns" && protocol != "fakedns+others" && !isFakeIP {
- ob.RouteTarget = destination
- } else {
- ob.Target = destination
- }
- }
- d.routedDispatch(ctx, outbound, destination)
- }
- return nil
- }
- func sniffer(ctx context.Context, cReader *cachedReader, metadataOnly bool, network net.Network) (SniffResult, error) {
- payload := buf.New()
- defer payload.Release()
- sniffer := NewSniffer(ctx)
- metaresult, metadataErr := sniffer.SniffMetadata(ctx)
- if metadataOnly {
- return metaresult, metadataErr
- }
- contentResult, contentErr := func() (SniffResult, error) {
- totalAttempt := 0
- for {
- select {
- case <-ctx.Done():
- return nil, ctx.Err()
- default:
- totalAttempt++
- if totalAttempt > 2 {
- return nil, errSniffingTimeout
- }
- cReader.Cache(payload)
- if !payload.IsEmpty() {
- result, err := sniffer.Sniff(ctx, payload.Bytes(), network)
- if err != common.ErrNoClue {
- return result, err
- }
- }
- if payload.IsFull() {
- return nil, errUnknownContent
- }
- }
- }
- }()
- if contentErr != nil && metadataErr == nil {
- return metaresult, nil
- }
- if contentErr == nil && metadataErr == nil {
- return CompositeResult(metaresult, contentResult), nil
- }
- return contentResult, contentErr
- }
- func (d *DefaultDispatcher) routedDispatch(ctx context.Context, link *transport.Link, destination net.Destination) {
- outbounds := session.OutboundsFromContext(ctx)
- ob := outbounds[len(outbounds)-1]
- if hosts, ok := d.dns.(dns.HostsLookup); ok && destination.Address.Family().IsDomain() {
- proxied := hosts.LookupHosts(ob.Target.String())
- if proxied != nil {
- ro := ob.RouteTarget == destination
- destination.Address = *proxied
- if ro {
- ob.RouteTarget = destination
- } else {
- ob.Target = destination
- }
- }
- }
- var handler outbound.Handler
- routingLink := routing_session.AsRoutingContext(ctx)
- inTag := routingLink.GetInboundTag()
- isPickRoute := 0
- if forcedOutboundTag := session.GetForcedOutboundTagFromContext(ctx); forcedOutboundTag != "" {
- ctx = session.SetForcedOutboundTagToContext(ctx, "")
- if h := d.ohm.GetHandler(forcedOutboundTag); h != nil {
- isPickRoute = 1
- errors.LogInfo(ctx, "taking platform initialized detour [", forcedOutboundTag, "] for [", destination, "]")
- handler = h
- } else {
- errors.LogError(ctx, "non existing tag for platform initialized detour: ", forcedOutboundTag)
- common.Close(link.Writer)
- common.Interrupt(link.Reader)
- return
- }
- } else if d.router != nil {
- if route, err := d.router.PickRoute(routingLink); err == nil {
- outTag := route.GetOutboundTag()
- if h := d.ohm.GetHandler(outTag); h != nil {
- isPickRoute = 2
- if route.GetRuleTag() == "" {
- errors.LogInfo(ctx, "taking detour [", outTag, "] for [", destination, "]")
- } else {
- errors.LogInfo(ctx, "Hit route rule: [", route.GetRuleTag(), "] so taking detour [", outTag, "] for [", destination, "]")
- }
- handler = h
- } else {
- errors.LogWarning(ctx, "non existing outTag: ", outTag)
- }
- } else {
- errors.LogInfo(ctx, "default route for ", destination)
- }
- }
- if handler == nil {
- handler = d.ohm.GetDefaultHandler()
- }
- if handler == nil {
- errors.LogInfo(ctx, "default outbound handler not exist")
- common.Close(link.Writer)
- common.Interrupt(link.Reader)
- return
- }
- ob.Tag = handler.Tag()
- if accessMessage := log.AccessMessageFromContext(ctx); accessMessage != nil {
- if tag := handler.Tag(); tag != "" {
- if inTag == "" {
- accessMessage.Detour = tag
- } else if isPickRoute == 1 {
- accessMessage.Detour = inTag + " ==> " + tag
- } else if isPickRoute == 2 {
- accessMessage.Detour = inTag + " -> " + tag
- } else {
- accessMessage.Detour = inTag + " >> " + tag
- }
- }
- log.Record(accessMessage)
- }
- handler.Dispatch(ctx, link)
- }
|