| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274 |
- package conf
- import (
- "strings"
- "github.com/sagernet/sing-shadowsocks/shadowaead_2022"
- C "github.com/sagernet/sing/common"
- "github.com/xtls/xray-core/common/errors"
- "github.com/xtls/xray-core/common/protocol"
- "github.com/xtls/xray-core/common/serial"
- "github.com/xtls/xray-core/proxy/shadowsocks"
- "github.com/xtls/xray-core/proxy/shadowsocks_2022"
- "google.golang.org/protobuf/proto"
- )
- func cipherFromString(c string) shadowsocks.CipherType {
- switch strings.ToLower(c) {
- case "aes-128-gcm", "aead_aes_128_gcm":
- return shadowsocks.CipherType_AES_128_GCM
- case "aes-256-gcm", "aead_aes_256_gcm":
- return shadowsocks.CipherType_AES_256_GCM
- case "chacha20-poly1305", "aead_chacha20_poly1305", "chacha20-ietf-poly1305":
- return shadowsocks.CipherType_CHACHA20_POLY1305
- case "xchacha20-poly1305", "aead_xchacha20_poly1305", "xchacha20-ietf-poly1305":
- return shadowsocks.CipherType_XCHACHA20_POLY1305
- case "none", "plain":
- return shadowsocks.CipherType_NONE
- default:
- return shadowsocks.CipherType_UNKNOWN
- }
- }
- type ShadowsocksUserConfig struct {
- Cipher string `json:"method"`
- Password string `json:"password"`
- Level byte `json:"level"`
- Email string `json:"email"`
- Address *Address `json:"address"`
- Port uint16 `json:"port"`
- }
- type ShadowsocksServerConfig struct {
- Cipher string `json:"method"`
- Password string `json:"password"`
- Level byte `json:"level"`
- Email string `json:"email"`
- Users []*ShadowsocksUserConfig `json:"clients"`
- NetworkList *NetworkList `json:"network"`
- IVCheck bool `json:"ivCheck"`
- }
- func (v *ShadowsocksServerConfig) Build() (proto.Message, error) {
- if C.Contains(shadowaead_2022.List, v.Cipher) {
- return buildShadowsocks2022(v)
- }
- config := new(shadowsocks.ServerConfig)
- config.Network = v.NetworkList.Build()
- if v.Users != nil {
- for _, user := range v.Users {
- account := &shadowsocks.Account{
- Password: user.Password,
- CipherType: cipherFromString(user.Cipher),
- IvCheck: v.IVCheck,
- }
- if account.Password == "" {
- return nil, errors.New("Shadowsocks password is not specified.")
- }
- if account.CipherType < shadowsocks.CipherType_AES_128_GCM ||
- account.CipherType > shadowsocks.CipherType_XCHACHA20_POLY1305 {
- return nil, errors.New("unsupported cipher method: ", user.Cipher)
- }
- config.Users = append(config.Users, &protocol.User{
- Email: user.Email,
- Level: uint32(user.Level),
- Account: serial.ToTypedMessage(account),
- })
- }
- } else {
- account := &shadowsocks.Account{
- Password: v.Password,
- CipherType: cipherFromString(v.Cipher),
- IvCheck: v.IVCheck,
- }
- if account.Password == "" {
- return nil, errors.New("Shadowsocks password is not specified.")
- }
- if account.CipherType == shadowsocks.CipherType_UNKNOWN {
- return nil, errors.New("unknown cipher method: ", v.Cipher)
- }
- config.Users = append(config.Users, &protocol.User{
- Email: v.Email,
- Level: uint32(v.Level),
- Account: serial.ToTypedMessage(account),
- })
- }
- return config, nil
- }
- func buildShadowsocks2022(v *ShadowsocksServerConfig) (proto.Message, error) {
- if len(v.Users) == 0 {
- config := new(shadowsocks_2022.ServerConfig)
- config.Method = v.Cipher
- config.Key = v.Password
- config.Network = v.NetworkList.Build()
- config.Email = v.Email
- return config, nil
- }
- if v.Cipher == "" {
- return nil, errors.New("shadowsocks 2022 (multi-user): missing server method")
- }
- if !strings.Contains(v.Cipher, "aes") {
- return nil, errors.New("shadowsocks 2022 (multi-user): only blake3-aes-*-gcm methods are supported")
- }
- if v.Users[0].Address == nil {
- config := new(shadowsocks_2022.MultiUserServerConfig)
- config.Method = v.Cipher
- config.Key = v.Password
- config.Network = v.NetworkList.Build()
- for _, user := range v.Users {
- if user.Cipher != "" {
- return nil, errors.New("shadowsocks 2022 (multi-user): users must have empty method")
- }
- account := &shadowsocks_2022.Account{
- Key: user.Password,
- }
- config.Users = append(config.Users, &protocol.User{
- Email: user.Email,
- Level: uint32(user.Level),
- Account: serial.ToTypedMessage(account),
- })
- }
- return config, nil
- }
- config := new(shadowsocks_2022.RelayServerConfig)
- config.Method = v.Cipher
- config.Key = v.Password
- config.Network = v.NetworkList.Build()
- for _, user := range v.Users {
- if user.Cipher != "" {
- return nil, errors.New("shadowsocks 2022 (relay): users must have empty method")
- }
- if user.Address == nil {
- return nil, errors.New("shadowsocks 2022 (relay): all users must have relay address")
- }
- config.Destinations = append(config.Destinations, &shadowsocks_2022.RelayDestination{
- Key: user.Password,
- Email: user.Email,
- Address: user.Address.Build(),
- Port: uint32(user.Port),
- })
- }
- return config, nil
- }
- type ShadowsocksServerTarget struct {
- Address *Address `json:"address"`
- Port uint16 `json:"port"`
- Level byte `json:"level"`
- Email string `json:"email"`
- Cipher string `json:"method"`
- Password string `json:"password"`
- IVCheck bool `json:"ivCheck"`
- UoT bool `json:"uot"`
- UoTVersion int `json:"uotVersion"`
- }
- type ShadowsocksClientConfig struct {
- Address *Address `json:"address"`
- Port uint16 `json:"port"`
- Level byte `json:"level"`
- Email string `json:"email"`
- Cipher string `json:"method"`
- Password string `json:"password"`
- IVCheck bool `json:"ivCheck"`
- UoT bool `json:"uot"`
- UoTVersion int `json:"uotVersion"`
- Servers []*ShadowsocksServerTarget `json:"servers"`
- }
- func (v *ShadowsocksClientConfig) Build() (proto.Message, error) {
- if v.Address != nil {
- v.Servers = []*ShadowsocksServerTarget{
- {
- Address: v.Address,
- Port: v.Port,
- Level: v.Level,
- Email: v.Email,
- Cipher: v.Cipher,
- Password: v.Password,
- IVCheck: v.IVCheck,
- UoT: v.UoT,
- UoTVersion: v.UoTVersion,
- },
- }
- }
- if len(v.Servers) == 0 {
- return nil, errors.New("0 Shadowsocks server configured.")
- }
- if len(v.Servers) == 1 {
- server := v.Servers[0]
- if C.Contains(shadowaead_2022.List, server.Cipher) {
- if server.Address == nil {
- return nil, errors.New("Shadowsocks server address is not set.")
- }
- if server.Port == 0 {
- return nil, errors.New("Invalid Shadowsocks port.")
- }
- if server.Password == "" {
- return nil, errors.New("Shadowsocks password is not specified.")
- }
- config := new(shadowsocks_2022.ClientConfig)
- config.Address = server.Address.Build()
- config.Port = uint32(server.Port)
- config.Method = server.Cipher
- config.Key = server.Password
- config.UdpOverTcp = server.UoT
- config.UdpOverTcpVersion = uint32(server.UoTVersion)
- return config, nil
- }
- }
- config := new(shadowsocks.ClientConfig)
- serverSpecs := make([]*protocol.ServerEndpoint, len(v.Servers))
- for idx, server := range v.Servers {
- if C.Contains(shadowaead_2022.List, server.Cipher) {
- return nil, errors.New("Shadowsocks 2022 accept no multi servers")
- }
- if server.Address == nil {
- return nil, errors.New("Shadowsocks server address is not set.")
- }
- if server.Port == 0 {
- return nil, errors.New("Invalid Shadowsocks port.")
- }
- if server.Password == "" {
- return nil, errors.New("Shadowsocks password is not specified.")
- }
- account := &shadowsocks.Account{
- Password: server.Password,
- }
- account.CipherType = cipherFromString(server.Cipher)
- if account.CipherType == shadowsocks.CipherType_UNKNOWN {
- return nil, errors.New("unknown cipher method: ", server.Cipher)
- }
- account.IvCheck = server.IVCheck
- ss := &protocol.ServerEndpoint{
- Address: server.Address.Build(),
- Port: uint32(server.Port),
- User: []*protocol.User{
- {
- Level: uint32(server.Level),
- Email: server.Email,
- Account: serial.ToTypedMessage(account),
- },
- },
- }
- serverSpecs[idx] = ss
- }
- config.Server = serverSpecs
- return config, nil
- }
|