server.go 8.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327
  1. package mux
  2. import (
  3. "context"
  4. "io"
  5. "github.com/xtls/xray-core/common"
  6. "github.com/xtls/xray-core/common/buf"
  7. "github.com/xtls/xray-core/common/errors"
  8. "github.com/xtls/xray-core/common/log"
  9. "github.com/xtls/xray-core/common/net"
  10. "github.com/xtls/xray-core/common/protocol"
  11. "github.com/xtls/xray-core/common/session"
  12. "github.com/xtls/xray-core/core"
  13. "github.com/xtls/xray-core/features/routing"
  14. "github.com/xtls/xray-core/transport"
  15. "github.com/xtls/xray-core/transport/pipe"
  16. )
  17. type Server struct {
  18. dispatcher routing.Dispatcher
  19. }
  20. // NewServer creates a new mux.Server.
  21. func NewServer(ctx context.Context) *Server {
  22. s := &Server{}
  23. core.RequireFeatures(ctx, func(d routing.Dispatcher) {
  24. s.dispatcher = d
  25. })
  26. return s
  27. }
  28. // Type implements common.HasType.
  29. func (s *Server) Type() interface{} {
  30. return s.dispatcher.Type()
  31. }
  32. // Dispatch implements routing.Dispatcher
  33. func (s *Server) Dispatch(ctx context.Context, dest net.Destination) (*transport.Link, error) {
  34. if dest.Address != muxCoolAddress {
  35. return s.dispatcher.Dispatch(ctx, dest)
  36. }
  37. opts := pipe.OptionsFromContext(ctx)
  38. uplinkReader, uplinkWriter := pipe.New(opts...)
  39. downlinkReader, downlinkWriter := pipe.New(opts...)
  40. _, err := NewServerWorker(ctx, s.dispatcher, &transport.Link{
  41. Reader: uplinkReader,
  42. Writer: downlinkWriter,
  43. })
  44. if err != nil {
  45. return nil, err
  46. }
  47. return &transport.Link{Reader: downlinkReader, Writer: uplinkWriter}, nil
  48. }
  49. // DispatchLink implements routing.Dispatcher
  50. func (s *Server) DispatchLink(ctx context.Context, dest net.Destination, link *transport.Link) error {
  51. if dest.Address != muxCoolAddress {
  52. return s.dispatcher.DispatchLink(ctx, dest, link)
  53. }
  54. _, err := NewServerWorker(ctx, s.dispatcher, link)
  55. return err
  56. }
  57. // Start implements common.Runnable.
  58. func (s *Server) Start() error {
  59. return nil
  60. }
  61. // Close implements common.Closable.
  62. func (s *Server) Close() error {
  63. return nil
  64. }
  65. type ServerWorker struct {
  66. dispatcher routing.Dispatcher
  67. link *transport.Link
  68. sessionManager *SessionManager
  69. }
  70. func NewServerWorker(ctx context.Context, d routing.Dispatcher, link *transport.Link) (*ServerWorker, error) {
  71. worker := &ServerWorker{
  72. dispatcher: d,
  73. link: link,
  74. sessionManager: NewSessionManager(),
  75. }
  76. go worker.run(ctx)
  77. return worker, nil
  78. }
  79. func handle(ctx context.Context, s *Session, output buf.Writer) {
  80. writer := NewResponseWriter(s.ID, output, s.transferType)
  81. if err := buf.Copy(s.input, writer); err != nil {
  82. errors.LogInfoInner(ctx, err, "session ", s.ID, " ends.")
  83. writer.hasError = true
  84. }
  85. writer.Close()
  86. s.Close(false)
  87. }
  88. func (w *ServerWorker) ActiveConnections() uint32 {
  89. return uint32(w.sessionManager.Size())
  90. }
  91. func (w *ServerWorker) Closed() bool {
  92. return w.sessionManager.Closed()
  93. }
  94. func (w *ServerWorker) handleStatusKeepAlive(meta *FrameMetadata, reader *buf.BufferedReader) error {
  95. if meta.Option.Has(OptionData) {
  96. return buf.Copy(NewStreamReader(reader), buf.Discard)
  97. }
  98. return nil
  99. }
  100. func (w *ServerWorker) handleStatusNew(ctx context.Context, meta *FrameMetadata, reader *buf.BufferedReader) error {
  101. // deep-clone outbounds because it is going to be mutated concurrently
  102. // (Target and OriginalTarget)
  103. ctx = session.ContextCloneOutbounds(ctx)
  104. errors.LogInfo(ctx, "received request for ", meta.Target)
  105. {
  106. msg := &log.AccessMessage{
  107. To: meta.Target,
  108. Status: log.AccessAccepted,
  109. Reason: "",
  110. }
  111. if inbound := session.InboundFromContext(ctx); inbound != nil && inbound.Source.IsValid() {
  112. msg.From = inbound.Source
  113. msg.Email = inbound.User.Email
  114. }
  115. ctx = log.ContextWithAccessMessage(ctx, msg)
  116. }
  117. if network := session.AllowedNetworkFromContext(ctx); network != net.Network_Unknown {
  118. if meta.Target.Network != network {
  119. return errors.New("unexpected network ", meta.Target.Network) // it will break the whole Mux connection
  120. }
  121. }
  122. if meta.GlobalID != [8]byte{} { // MUST ignore empty Global ID
  123. mb, err := NewPacketReader(reader, &meta.Target).ReadMultiBuffer()
  124. if err != nil {
  125. return err
  126. }
  127. XUDPManager.Lock()
  128. x := XUDPManager.Map[meta.GlobalID]
  129. if x == nil {
  130. x = &XUDP{GlobalID: meta.GlobalID}
  131. XUDPManager.Map[meta.GlobalID] = x
  132. XUDPManager.Unlock()
  133. } else {
  134. if x.Status == Initializing { // nearly impossible
  135. XUDPManager.Unlock()
  136. errors.LogWarningInner(ctx, errors.New("conflict"), "XUDP hit ", meta.GlobalID)
  137. // It's not a good idea to return an err here, so just let client wait.
  138. // Client will receive an End frame after sending a Keep frame.
  139. return nil
  140. }
  141. x.Status = Initializing
  142. XUDPManager.Unlock()
  143. x.Mux.Close(false) // detach from previous Mux
  144. b := buf.New()
  145. b.Write(mb[0].Bytes())
  146. b.UDP = mb[0].UDP
  147. if err = x.Mux.output.WriteMultiBuffer(mb); err != nil {
  148. x.Interrupt()
  149. mb = buf.MultiBuffer{b}
  150. } else {
  151. b.Release()
  152. mb = nil
  153. }
  154. errors.LogInfoInner(ctx, err, "XUDP hit ", meta.GlobalID)
  155. }
  156. if mb != nil {
  157. ctx = session.ContextWithTimeoutOnly(ctx, true)
  158. // Actually, it won't return an error in Xray-core's implementations.
  159. link, err := w.dispatcher.Dispatch(ctx, meta.Target)
  160. if err != nil {
  161. XUDPManager.Lock()
  162. delete(XUDPManager.Map, x.GlobalID)
  163. XUDPManager.Unlock()
  164. err = errors.New("XUDP new ", meta.GlobalID).Base(errors.New("failed to dispatch request to ", meta.Target).Base(err))
  165. return err // it will break the whole Mux connection
  166. }
  167. link.Writer.WriteMultiBuffer(mb) // it's meaningless to test a new pipe
  168. x.Mux = &Session{
  169. input: link.Reader,
  170. output: link.Writer,
  171. }
  172. errors.LogInfoInner(ctx, err, "XUDP new ", meta.GlobalID)
  173. }
  174. x.Mux = &Session{
  175. input: x.Mux.input,
  176. output: x.Mux.output,
  177. parent: w.sessionManager,
  178. ID: meta.SessionID,
  179. transferType: protocol.TransferTypePacket,
  180. XUDP: x,
  181. }
  182. go handle(ctx, x.Mux, w.link.Writer)
  183. x.Status = Active
  184. if !w.sessionManager.Add(x.Mux) {
  185. x.Mux.Close(false)
  186. }
  187. return nil
  188. }
  189. link, err := w.dispatcher.Dispatch(ctx, meta.Target)
  190. if err != nil {
  191. if meta.Option.Has(OptionData) {
  192. buf.Copy(NewStreamReader(reader), buf.Discard)
  193. }
  194. return errors.New("failed to dispatch request.").Base(err)
  195. }
  196. s := &Session{
  197. input: link.Reader,
  198. output: link.Writer,
  199. parent: w.sessionManager,
  200. ID: meta.SessionID,
  201. transferType: protocol.TransferTypeStream,
  202. }
  203. if meta.Target.Network == net.Network_UDP {
  204. s.transferType = protocol.TransferTypePacket
  205. }
  206. w.sessionManager.Add(s)
  207. go handle(ctx, s, w.link.Writer)
  208. if !meta.Option.Has(OptionData) {
  209. return nil
  210. }
  211. rr := s.NewReader(reader, &meta.Target)
  212. if err := buf.Copy(rr, s.output); err != nil {
  213. buf.Copy(rr, buf.Discard)
  214. return s.Close(false)
  215. }
  216. return nil
  217. }
  218. func (w *ServerWorker) handleStatusKeep(meta *FrameMetadata, reader *buf.BufferedReader) error {
  219. if !meta.Option.Has(OptionData) {
  220. return nil
  221. }
  222. s, found := w.sessionManager.Get(meta.SessionID)
  223. if !found {
  224. // Notify remote peer to close this session.
  225. closingWriter := NewResponseWriter(meta.SessionID, w.link.Writer, protocol.TransferTypeStream)
  226. closingWriter.Close()
  227. return buf.Copy(NewStreamReader(reader), buf.Discard)
  228. }
  229. rr := s.NewReader(reader, &meta.Target)
  230. err := buf.Copy(rr, s.output)
  231. if err != nil && buf.IsWriteError(err) {
  232. errors.LogInfoInner(context.Background(), err, "failed to write to downstream writer. closing session ", s.ID)
  233. s.Close(false)
  234. return buf.Copy(rr, buf.Discard)
  235. }
  236. return err
  237. }
  238. func (w *ServerWorker) handleStatusEnd(meta *FrameMetadata, reader *buf.BufferedReader) error {
  239. if s, found := w.sessionManager.Get(meta.SessionID); found {
  240. s.Close(false)
  241. }
  242. if meta.Option.Has(OptionData) {
  243. return buf.Copy(NewStreamReader(reader), buf.Discard)
  244. }
  245. return nil
  246. }
  247. func (w *ServerWorker) handleFrame(ctx context.Context, reader *buf.BufferedReader) error {
  248. var meta FrameMetadata
  249. err := meta.Unmarshal(reader)
  250. if err != nil {
  251. return errors.New("failed to read metadata").Base(err)
  252. }
  253. switch meta.SessionStatus {
  254. case SessionStatusKeepAlive:
  255. err = w.handleStatusKeepAlive(&meta, reader)
  256. case SessionStatusEnd:
  257. err = w.handleStatusEnd(&meta, reader)
  258. case SessionStatusNew:
  259. err = w.handleStatusNew(ctx, &meta, reader)
  260. case SessionStatusKeep:
  261. err = w.handleStatusKeep(&meta, reader)
  262. default:
  263. status := meta.SessionStatus
  264. return errors.New("unknown status: ", status).AtError()
  265. }
  266. if err != nil {
  267. return errors.New("failed to process data").Base(err)
  268. }
  269. return nil
  270. }
  271. func (w *ServerWorker) run(ctx context.Context) {
  272. input := w.link.Reader
  273. reader := &buf.BufferedReader{Reader: input}
  274. defer w.sessionManager.Close()
  275. for {
  276. select {
  277. case <-ctx.Done():
  278. return
  279. default:
  280. err := w.handleFrame(ctx, reader)
  281. if err != nil {
  282. if errors.Cause(err) != io.EOF {
  283. errors.LogInfoInner(ctx, err, "unexpected EOF")
  284. common.Interrupt(input)
  285. }
  286. return
  287. }
  288. }
  289. }
  290. }