| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510 |
- package inbound
- import (
- "context"
- "sync"
- "sync/atomic"
- "time"
- "github.com/xtls/xray-core/app/proxyman"
- "github.com/xtls/xray-core/common"
- "github.com/xtls/xray-core/common/buf"
- "github.com/xtls/xray-core/common/net"
- "github.com/xtls/xray-core/common/serial"
- "github.com/xtls/xray-core/common/session"
- "github.com/xtls/xray-core/common/signal/done"
- "github.com/xtls/xray-core/common/task"
- "github.com/xtls/xray-core/features/routing"
- "github.com/xtls/xray-core/features/stats"
- "github.com/xtls/xray-core/proxy"
- "github.com/xtls/xray-core/transport/internet"
- "github.com/xtls/xray-core/transport/internet/tcp"
- "github.com/xtls/xray-core/transport/internet/udp"
- "github.com/xtls/xray-core/transport/pipe"
- )
- type worker interface {
- Start() error
- Close() error
- Port() net.Port
- Proxy() proxy.Inbound
- }
- type tcpWorker struct {
- address net.Address
- port net.Port
- proxy proxy.Inbound
- stream *internet.MemoryStreamConfig
- recvOrigDest bool
- tag string
- dispatcher routing.Dispatcher
- sniffingConfig *proxyman.SniffingConfig
- uplinkCounter stats.Counter
- downlinkCounter stats.Counter
- hub internet.Listener
- ctx context.Context
- }
- func getTProxyType(s *internet.MemoryStreamConfig) internet.SocketConfig_TProxyMode {
- if s == nil || s.SocketSettings == nil {
- return internet.SocketConfig_Off
- }
- return s.SocketSettings.Tproxy
- }
- func (w *tcpWorker) callback(conn internet.Connection) {
- ctx, cancel := context.WithCancel(w.ctx)
- sid := session.NewID()
- ctx = session.ContextWithID(ctx, sid)
- if w.recvOrigDest {
- var dest net.Destination
- switch getTProxyType(w.stream) {
- case internet.SocketConfig_Redirect:
- d, err := tcp.GetOriginalDestination(conn)
- if err != nil {
- newError("failed to get original destination").Base(err).WriteToLog(session.ExportIDToError(ctx))
- } else {
- dest = d
- }
- case internet.SocketConfig_TProxy:
- dest = net.DestinationFromAddr(conn.LocalAddr())
- }
- if dest.IsValid() {
- ctx = session.ContextWithOutbound(ctx, &session.Outbound{
- Target: dest,
- })
- }
- }
- if w.uplinkCounter != nil || w.downlinkCounter != nil {
- conn = &internet.StatCouterConnection{
- Connection: conn,
- ReadCounter: w.uplinkCounter,
- WriteCounter: w.downlinkCounter,
- }
- }
- ctx = session.ContextWithInbound(ctx, &session.Inbound{
- Source: net.DestinationFromAddr(conn.RemoteAddr()),
- Gateway: net.TCPDestination(w.address, w.port),
- Tag: w.tag,
- Conn: conn,
- })
- content := new(session.Content)
- if w.sniffingConfig != nil {
- content.SniffingRequest.Enabled = w.sniffingConfig.Enabled
- content.SniffingRequest.OverrideDestinationForProtocol = w.sniffingConfig.DestinationOverride
- content.SniffingRequest.ExcludeForDomain = w.sniffingConfig.DomainsExcluded
- content.SniffingRequest.MetadataOnly = w.sniffingConfig.MetadataOnly
- }
- ctx = session.ContextWithContent(ctx, content)
- if err := w.proxy.Process(ctx, net.Network_TCP, conn, w.dispatcher); err != nil {
- newError("connection ends").Base(err).WriteToLog(session.ExportIDToError(ctx))
- }
- cancel()
- if err := conn.Close(); err != nil {
- newError("failed to close connection").Base(err).WriteToLog(session.ExportIDToError(ctx))
- }
- }
- func (w *tcpWorker) Proxy() proxy.Inbound {
- return w.proxy
- }
- func (w *tcpWorker) Start() error {
- ctx := context.Background()
- hub, err := internet.ListenTCP(ctx, w.address, w.port, w.stream, func(conn internet.Connection) {
- go w.callback(conn)
- })
- if err != nil {
- return newError("failed to listen TCP on ", w.port).AtWarning().Base(err)
- }
- w.hub = hub
- return nil
- }
- func (w *tcpWorker) Close() error {
- var errors []interface{}
- if w.hub != nil {
- if err := common.Close(w.hub); err != nil {
- errors = append(errors, err)
- }
- if err := common.Close(w.proxy); err != nil {
- errors = append(errors, err)
- }
- }
- if len(errors) > 0 {
- return newError("failed to close all resources").Base(newError(serial.Concat(errors...)))
- }
- return nil
- }
- func (w *tcpWorker) Port() net.Port {
- return w.port
- }
- type udpConn struct {
- lastActivityTime int64 // in seconds
- reader buf.Reader
- writer buf.Writer
- output func([]byte) (int, error)
- remote net.Addr
- local net.Addr
- done *done.Instance
- uplink stats.Counter
- downlink stats.Counter
- }
- func (c *udpConn) updateActivity() {
- atomic.StoreInt64(&c.lastActivityTime, time.Now().Unix())
- }
- // ReadMultiBuffer implements buf.Reader
- func (c *udpConn) ReadMultiBuffer() (buf.MultiBuffer, error) {
- mb, err := c.reader.ReadMultiBuffer()
- if err != nil {
- return nil, err
- }
- c.updateActivity()
- if c.uplink != nil {
- c.uplink.Add(int64(mb.Len()))
- }
- return mb, nil
- }
- func (c *udpConn) Read(buf []byte) (int, error) {
- panic("not implemented")
- }
- // Write implements io.Writer.
- func (c *udpConn) Write(buf []byte) (int, error) {
- n, err := c.output(buf)
- if c.downlink != nil {
- c.downlink.Add(int64(n))
- }
- if err == nil {
- c.updateActivity()
- }
- return n, err
- }
- func (c *udpConn) Close() error {
- common.Must(c.done.Close())
- common.Must(common.Close(c.writer))
- return nil
- }
- func (c *udpConn) RemoteAddr() net.Addr {
- return c.remote
- }
- func (c *udpConn) LocalAddr() net.Addr {
- return c.local
- }
- func (*udpConn) SetDeadline(time.Time) error {
- return nil
- }
- func (*udpConn) SetReadDeadline(time.Time) error {
- return nil
- }
- func (*udpConn) SetWriteDeadline(time.Time) error {
- return nil
- }
- type connID struct {
- src net.Destination
- dest net.Destination
- }
- type udpWorker struct {
- sync.RWMutex
- proxy proxy.Inbound
- hub *udp.Hub
- address net.Address
- port net.Port
- tag string
- stream *internet.MemoryStreamConfig
- dispatcher routing.Dispatcher
- sniffingConfig *proxyman.SniffingConfig
- uplinkCounter stats.Counter
- downlinkCounter stats.Counter
- checker *task.Periodic
- activeConn map[connID]*udpConn
- ctx context.Context
- cone bool
- }
- func (w *udpWorker) getConnection(id connID) (*udpConn, bool) {
- w.Lock()
- defer w.Unlock()
- if conn, found := w.activeConn[id]; found && !conn.done.Done() {
- return conn, true
- }
- pReader, pWriter := pipe.New(pipe.DiscardOverflow(), pipe.WithSizeLimit(16*1024))
- conn := &udpConn{
- reader: pReader,
- writer: pWriter,
- output: func(b []byte) (int, error) {
- return w.hub.WriteTo(b, id.src)
- },
- remote: &net.UDPAddr{
- IP: id.src.Address.IP(),
- Port: int(id.src.Port),
- },
- local: &net.UDPAddr{
- IP: w.address.IP(),
- Port: int(w.port),
- },
- done: done.New(),
- uplink: w.uplinkCounter,
- downlink: w.downlinkCounter,
- }
- w.activeConn[id] = conn
- conn.updateActivity()
- return conn, false
- }
- func (w *udpWorker) callback(b *buf.Buffer, source net.Destination, originalDest net.Destination) {
- id := connID{
- src: source,
- }
- if originalDest.IsValid() {
- if !w.cone {
- id.dest = originalDest
- }
- b.UDP = &originalDest
- }
- conn, existing := w.getConnection(id)
- // payload will be discarded in pipe is full.
- conn.writer.WriteMultiBuffer(buf.MultiBuffer{b})
- if !existing {
- common.Must(w.checker.Start())
- go func() {
- ctx := w.ctx
- sid := session.NewID()
- ctx = session.ContextWithID(ctx, sid)
- if originalDest.IsValid() {
- ctx = session.ContextWithOutbound(ctx, &session.Outbound{
- Target: originalDest,
- })
- }
- ctx = session.ContextWithInbound(ctx, &session.Inbound{
- Source: source,
- Gateway: net.UDPDestination(w.address, w.port),
- Tag: w.tag,
- })
- content := new(session.Content)
- if w.sniffingConfig != nil {
- content.SniffingRequest.Enabled = w.sniffingConfig.Enabled
- content.SniffingRequest.OverrideDestinationForProtocol = w.sniffingConfig.DestinationOverride
- content.SniffingRequest.MetadataOnly = w.sniffingConfig.MetadataOnly
- }
- ctx = session.ContextWithContent(ctx, content)
- if err := w.proxy.Process(ctx, net.Network_UDP, conn, w.dispatcher); err != nil {
- newError("connection ends").Base(err).WriteToLog(session.ExportIDToError(ctx))
- }
- conn.Close()
- w.removeConn(id)
- }()
- }
- }
- func (w *udpWorker) removeConn(id connID) {
- w.Lock()
- delete(w.activeConn, id)
- w.Unlock()
- }
- func (w *udpWorker) handlePackets() {
- receive := w.hub.Receive()
- for payload := range receive {
- w.callback(payload.Payload, payload.Source, payload.Target)
- }
- }
- func (w *udpWorker) clean() error {
- nowSec := time.Now().Unix()
- w.Lock()
- defer w.Unlock()
- if len(w.activeConn) == 0 {
- return newError("no more connections. stopping...")
- }
- for addr, conn := range w.activeConn {
- if nowSec-atomic.LoadInt64(&conn.lastActivityTime) > 300 {
- delete(w.activeConn, addr)
- conn.Close()
- }
- }
- if len(w.activeConn) == 0 {
- w.activeConn = make(map[connID]*udpConn, 16)
- }
- return nil
- }
- func (w *udpWorker) Start() error {
- w.activeConn = make(map[connID]*udpConn, 16)
- ctx := context.Background()
- h, err := udp.ListenUDP(ctx, w.address, w.port, w.stream, udp.HubCapacity(256))
- if err != nil {
- return err
- }
- w.cone = w.ctx.Value("cone").(bool)
- w.checker = &task.Periodic{
- Interval: time.Minute,
- Execute: w.clean,
- }
- w.hub = h
- go w.handlePackets()
- return nil
- }
- func (w *udpWorker) Close() error {
- w.Lock()
- defer w.Unlock()
- var errors []interface{}
- if w.hub != nil {
- if err := w.hub.Close(); err != nil {
- errors = append(errors, err)
- }
- }
- if w.checker != nil {
- if err := w.checker.Close(); err != nil {
- errors = append(errors, err)
- }
- }
- if err := common.Close(w.proxy); err != nil {
- errors = append(errors, err)
- }
- if len(errors) > 0 {
- return newError("failed to close all resources").Base(newError(serial.Concat(errors...)))
- }
- return nil
- }
- func (w *udpWorker) Port() net.Port {
- return w.port
- }
- func (w *udpWorker) Proxy() proxy.Inbound {
- return w.proxy
- }
- type dsWorker struct {
- address net.Address
- proxy proxy.Inbound
- stream *internet.MemoryStreamConfig
- tag string
- dispatcher routing.Dispatcher
- sniffingConfig *proxyman.SniffingConfig
- uplinkCounter stats.Counter
- downlinkCounter stats.Counter
- hub internet.Listener
- ctx context.Context
- }
- func (w *dsWorker) callback(conn internet.Connection) {
- ctx, cancel := context.WithCancel(w.ctx)
- sid := session.NewID()
- ctx = session.ContextWithID(ctx, sid)
- if w.uplinkCounter != nil || w.downlinkCounter != nil {
- conn = &internet.StatCouterConnection{
- Connection: conn,
- ReadCounter: w.uplinkCounter,
- WriteCounter: w.downlinkCounter,
- }
- }
- ctx = session.ContextWithInbound(ctx, &session.Inbound{
- Source: net.DestinationFromAddr(conn.RemoteAddr()),
- Gateway: net.UnixDestination(w.address),
- Tag: w.tag,
- Conn: conn,
- })
- content := new(session.Content)
- if w.sniffingConfig != nil {
- content.SniffingRequest.Enabled = w.sniffingConfig.Enabled
- content.SniffingRequest.OverrideDestinationForProtocol = w.sniffingConfig.DestinationOverride
- content.SniffingRequest.ExcludeForDomain = w.sniffingConfig.DomainsExcluded
- content.SniffingRequest.MetadataOnly = w.sniffingConfig.MetadataOnly
- }
- ctx = session.ContextWithContent(ctx, content)
- if err := w.proxy.Process(ctx, net.Network_UNIX, conn, w.dispatcher); err != nil {
- newError("connection ends").Base(err).WriteToLog(session.ExportIDToError(ctx))
- }
- cancel()
- if err := conn.Close(); err != nil {
- newError("failed to close connection").Base(err).WriteToLog(session.ExportIDToError(ctx))
- }
- }
- func (w *dsWorker) Proxy() proxy.Inbound {
- return w.proxy
- }
- func (w *dsWorker) Port() net.Port {
- return net.Port(0)
- }
- func (w *dsWorker) Start() error {
- ctx := context.Background()
- hub, err := internet.ListenUnix(ctx, w.address, w.stream, func(conn internet.Connection) {
- go w.callback(conn)
- })
- if err != nil {
- return newError("failed to listen Unix Domain Socket on ", w.address).AtWarning().Base(err)
- }
- w.hub = hub
- return nil
- }
- func (w *dsWorker) Close() error {
- var errors []interface{}
- if w.hub != nil {
- if err := common.Close(w.hub); err != nil {
- errors = append(errors, err)
- }
- if err := common.Close(w.proxy); err != nil {
- errors = append(errors, err)
- }
- }
- if len(errors) > 0 {
- return newError("failed to close all resources").Base(newError(serial.Concat(errors...)))
- }
- return nil
- }
|