server.go 9.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340
  1. package mux
  2. import (
  3. "context"
  4. "io"
  5. "github.com/xtls/xray-core/app/dispatcher"
  6. "github.com/xtls/xray-core/common"
  7. "github.com/xtls/xray-core/common/buf"
  8. "github.com/xtls/xray-core/common/errors"
  9. "github.com/xtls/xray-core/common/log"
  10. "github.com/xtls/xray-core/common/net"
  11. "github.com/xtls/xray-core/common/protocol"
  12. "github.com/xtls/xray-core/common/session"
  13. "github.com/xtls/xray-core/core"
  14. "github.com/xtls/xray-core/features/routing"
  15. "github.com/xtls/xray-core/transport"
  16. "github.com/xtls/xray-core/transport/pipe"
  17. )
  18. type Server struct {
  19. dispatcher routing.Dispatcher
  20. }
  21. // NewServer creates a new mux.Server.
  22. func NewServer(ctx context.Context) *Server {
  23. s := &Server{}
  24. core.RequireFeatures(ctx, func(d routing.Dispatcher) {
  25. s.dispatcher = d
  26. })
  27. return s
  28. }
  29. // Type implements common.HasType.
  30. func (s *Server) Type() interface{} {
  31. return s.dispatcher.Type()
  32. }
  33. // Dispatch implements routing.Dispatcher
  34. func (s *Server) Dispatch(ctx context.Context, dest net.Destination) (*transport.Link, error) {
  35. if dest.Address != muxCoolAddress {
  36. return s.dispatcher.Dispatch(ctx, dest)
  37. }
  38. opts := pipe.OptionsFromContext(ctx)
  39. uplinkReader, uplinkWriter := pipe.New(opts...)
  40. downlinkReader, downlinkWriter := pipe.New(opts...)
  41. _, err := NewServerWorker(ctx, s.dispatcher, &transport.Link{
  42. Reader: uplinkReader,
  43. Writer: downlinkWriter,
  44. })
  45. if err != nil {
  46. return nil, err
  47. }
  48. return &transport.Link{Reader: downlinkReader, Writer: uplinkWriter}, nil
  49. }
  50. // DispatchLink implements routing.Dispatcher
  51. func (s *Server) DispatchLink(ctx context.Context, dest net.Destination, link *transport.Link) error {
  52. if dest.Address != muxCoolAddress {
  53. return s.dispatcher.DispatchLink(ctx, dest, link)
  54. }
  55. link = s.dispatcher.(*dispatcher.DefaultDispatcher).WrapLink(ctx, link)
  56. _, err := NewServerWorker(ctx, s.dispatcher, link)
  57. return err
  58. }
  59. // Start implements common.Runnable.
  60. func (s *Server) Start() error {
  61. return nil
  62. }
  63. // Close implements common.Closable.
  64. func (s *Server) Close() error {
  65. return nil
  66. }
  67. type ServerWorker struct {
  68. dispatcher routing.Dispatcher
  69. link *transport.Link
  70. sessionManager *SessionManager
  71. }
  72. func NewServerWorker(ctx context.Context, d routing.Dispatcher, link *transport.Link) (*ServerWorker, error) {
  73. worker := &ServerWorker{
  74. dispatcher: d,
  75. link: link,
  76. sessionManager: NewSessionManager(),
  77. }
  78. if inbound := session.InboundFromContext(ctx); inbound != nil {
  79. inbound.CanSpliceCopy = 3
  80. }
  81. if _, ok := link.Reader.(*pipe.Reader); ok {
  82. go worker.run(ctx)
  83. } else {
  84. worker.run(ctx)
  85. }
  86. return worker, nil
  87. }
  88. func handle(ctx context.Context, s *Session, output buf.Writer) {
  89. writer := NewResponseWriter(s.ID, output, s.transferType)
  90. if err := buf.Copy(s.input, writer); err != nil {
  91. errors.LogInfoInner(ctx, err, "session ", s.ID, " ends.")
  92. writer.hasError = true
  93. }
  94. writer.Close()
  95. s.Close(false)
  96. }
  97. func (w *ServerWorker) ActiveConnections() uint32 {
  98. return uint32(w.sessionManager.Size())
  99. }
  100. func (w *ServerWorker) Closed() bool {
  101. return w.sessionManager.Closed()
  102. }
  103. func (w *ServerWorker) handleStatusKeepAlive(meta *FrameMetadata, reader *buf.BufferedReader) error {
  104. if meta.Option.Has(OptionData) {
  105. return buf.Copy(NewStreamReader(reader), buf.Discard)
  106. }
  107. return nil
  108. }
  109. func (w *ServerWorker) handleStatusNew(ctx context.Context, meta *FrameMetadata, reader *buf.BufferedReader) error {
  110. ctx = session.SubContextFromMuxInbound(ctx)
  111. errors.LogInfo(ctx, "received request for ", meta.Target)
  112. {
  113. msg := &log.AccessMessage{
  114. To: meta.Target,
  115. Status: log.AccessAccepted,
  116. Reason: "",
  117. }
  118. if inbound := session.InboundFromContext(ctx); inbound != nil && inbound.Source.IsValid() {
  119. msg.From = inbound.Source
  120. msg.Email = inbound.User.Email
  121. }
  122. ctx = log.ContextWithAccessMessage(ctx, msg)
  123. }
  124. if network := session.AllowedNetworkFromContext(ctx); network != net.Network_Unknown {
  125. if meta.Target.Network != network {
  126. return errors.New("unexpected network ", meta.Target.Network) // it will break the whole Mux connection
  127. }
  128. }
  129. if meta.GlobalID != [8]byte{} { // MUST ignore empty Global ID
  130. mb, err := NewPacketReader(reader, &meta.Target).ReadMultiBuffer()
  131. if err != nil {
  132. return err
  133. }
  134. XUDPManager.Lock()
  135. x := XUDPManager.Map[meta.GlobalID]
  136. if x == nil {
  137. x = &XUDP{GlobalID: meta.GlobalID}
  138. XUDPManager.Map[meta.GlobalID] = x
  139. XUDPManager.Unlock()
  140. } else {
  141. if x.Status == Initializing { // nearly impossible
  142. XUDPManager.Unlock()
  143. errors.LogWarningInner(ctx, errors.New("conflict"), "XUDP hit ", meta.GlobalID)
  144. // It's not a good idea to return an err here, so just let client wait.
  145. // Client will receive an End frame after sending a Keep frame.
  146. return nil
  147. }
  148. x.Status = Initializing
  149. XUDPManager.Unlock()
  150. x.Mux.Close(false) // detach from previous Mux
  151. b := buf.New()
  152. b.Write(mb[0].Bytes())
  153. b.UDP = mb[0].UDP
  154. if err = x.Mux.output.WriteMultiBuffer(mb); err != nil {
  155. x.Interrupt()
  156. mb = buf.MultiBuffer{b}
  157. } else {
  158. b.Release()
  159. mb = nil
  160. }
  161. errors.LogInfoInner(ctx, err, "XUDP hit ", meta.GlobalID)
  162. }
  163. if mb != nil {
  164. ctx = session.ContextWithTimeoutOnly(ctx, true)
  165. // Actually, it won't return an error in Xray-core's implementations.
  166. link, err := w.dispatcher.Dispatch(ctx, meta.Target)
  167. if err != nil {
  168. XUDPManager.Lock()
  169. delete(XUDPManager.Map, x.GlobalID)
  170. XUDPManager.Unlock()
  171. err = errors.New("XUDP new ", meta.GlobalID).Base(errors.New("failed to dispatch request to ", meta.Target).Base(err))
  172. return err // it will break the whole Mux connection
  173. }
  174. link.Writer.WriteMultiBuffer(mb) // it's meaningless to test a new pipe
  175. x.Mux = &Session{
  176. input: link.Reader,
  177. output: link.Writer,
  178. }
  179. errors.LogInfoInner(ctx, err, "XUDP new ", meta.GlobalID)
  180. }
  181. x.Mux = &Session{
  182. input: x.Mux.input,
  183. output: x.Mux.output,
  184. parent: w.sessionManager,
  185. ID: meta.SessionID,
  186. transferType: protocol.TransferTypePacket,
  187. XUDP: x,
  188. }
  189. x.Status = Active
  190. if !w.sessionManager.Add(x.Mux) {
  191. x.Mux.Close(false)
  192. return errors.New("failed to add new session")
  193. }
  194. go handle(ctx, x.Mux, w.link.Writer)
  195. return nil
  196. }
  197. link, err := w.dispatcher.Dispatch(ctx, meta.Target)
  198. if err != nil {
  199. if meta.Option.Has(OptionData) {
  200. buf.Copy(NewStreamReader(reader), buf.Discard)
  201. }
  202. return errors.New("failed to dispatch request.").Base(err)
  203. }
  204. s := &Session{
  205. input: link.Reader,
  206. output: link.Writer,
  207. parent: w.sessionManager,
  208. ID: meta.SessionID,
  209. transferType: protocol.TransferTypeStream,
  210. }
  211. if meta.Target.Network == net.Network_UDP {
  212. s.transferType = protocol.TransferTypePacket
  213. }
  214. if !w.sessionManager.Add(s) {
  215. s.Close(false)
  216. return errors.New("failed to add new session")
  217. }
  218. go handle(ctx, s, w.link.Writer)
  219. if !meta.Option.Has(OptionData) {
  220. return nil
  221. }
  222. rr := s.NewReader(reader, &meta.Target)
  223. err = buf.Copy(rr, s.output)
  224. if err != nil && buf.IsWriteError(err) {
  225. s.Close(false)
  226. return buf.Copy(rr, buf.Discard)
  227. }
  228. return err
  229. }
  230. func (w *ServerWorker) handleStatusKeep(meta *FrameMetadata, reader *buf.BufferedReader) error {
  231. if !meta.Option.Has(OptionData) {
  232. return nil
  233. }
  234. s, found := w.sessionManager.Get(meta.SessionID)
  235. if !found {
  236. // Notify remote peer to close this session.
  237. closingWriter := NewResponseWriter(meta.SessionID, w.link.Writer, protocol.TransferTypeStream)
  238. closingWriter.Close()
  239. return buf.Copy(NewStreamReader(reader), buf.Discard)
  240. }
  241. rr := s.NewReader(reader, &meta.Target)
  242. err := buf.Copy(rr, s.output)
  243. if err != nil && buf.IsWriteError(err) {
  244. errors.LogInfoInner(context.Background(), err, "failed to write to downstream writer. closing session ", s.ID)
  245. s.Close(false)
  246. return buf.Copy(rr, buf.Discard)
  247. }
  248. return err
  249. }
  250. func (w *ServerWorker) handleStatusEnd(meta *FrameMetadata, reader *buf.BufferedReader) error {
  251. if s, found := w.sessionManager.Get(meta.SessionID); found {
  252. s.Close(false)
  253. }
  254. if meta.Option.Has(OptionData) {
  255. return buf.Copy(NewStreamReader(reader), buf.Discard)
  256. }
  257. return nil
  258. }
  259. func (w *ServerWorker) handleFrame(ctx context.Context, reader *buf.BufferedReader) error {
  260. var meta FrameMetadata
  261. err := meta.Unmarshal(reader)
  262. if err != nil {
  263. return errors.New("failed to read metadata").Base(err)
  264. }
  265. switch meta.SessionStatus {
  266. case SessionStatusKeepAlive:
  267. err = w.handleStatusKeepAlive(&meta, reader)
  268. case SessionStatusEnd:
  269. err = w.handleStatusEnd(&meta, reader)
  270. case SessionStatusNew:
  271. err = w.handleStatusNew(ctx, &meta, reader)
  272. case SessionStatusKeep:
  273. err = w.handleStatusKeep(&meta, reader)
  274. default:
  275. status := meta.SessionStatus
  276. return errors.New("unknown status: ", status).AtError()
  277. }
  278. if err != nil {
  279. return errors.New("failed to process data").Base(err)
  280. }
  281. return nil
  282. }
  283. func (w *ServerWorker) run(ctx context.Context) {
  284. reader := &buf.BufferedReader{Reader: w.link.Reader}
  285. defer w.sessionManager.Close()
  286. defer common.Interrupt(w.link.Reader)
  287. defer common.Interrupt(w.link.Writer)
  288. for {
  289. select {
  290. case <-ctx.Done():
  291. return
  292. default:
  293. err := w.handleFrame(ctx, reader)
  294. if err != nil {
  295. if errors.Cause(err) != io.EOF {
  296. errors.LogInfoInner(ctx, err, "unexpected EOF")
  297. }
  298. return
  299. }
  300. }
  301. }
  302. }