server.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387
  1. package mux
  2. import (
  3. "context"
  4. "io"
  5. "time"
  6. "github.com/xtls/xray-core/common"
  7. "github.com/xtls/xray-core/common/buf"
  8. "github.com/xtls/xray-core/common/errors"
  9. "github.com/xtls/xray-core/common/log"
  10. "github.com/xtls/xray-core/common/net"
  11. "github.com/xtls/xray-core/common/protocol"
  12. "github.com/xtls/xray-core/common/session"
  13. "github.com/xtls/xray-core/common/signal/done"
  14. "github.com/xtls/xray-core/core"
  15. "github.com/xtls/xray-core/features/routing"
  16. "github.com/xtls/xray-core/transport"
  17. "github.com/xtls/xray-core/transport/pipe"
  18. )
  19. type Server struct {
  20. dispatcher routing.Dispatcher
  21. }
  22. // NewServer creates a new mux.Server.
  23. func NewServer(ctx context.Context) *Server {
  24. s := &Server{}
  25. core.RequireFeatures(ctx, func(d routing.Dispatcher) {
  26. s.dispatcher = d
  27. })
  28. return s
  29. }
  30. // Type implements common.HasType.
  31. func (s *Server) Type() interface{} {
  32. return s.dispatcher.Type()
  33. }
  34. // Dispatch implements routing.Dispatcher
  35. func (s *Server) Dispatch(ctx context.Context, dest net.Destination) (*transport.Link, error) {
  36. if dest.Address != muxCoolAddress {
  37. return s.dispatcher.Dispatch(ctx, dest)
  38. }
  39. opts := pipe.OptionsFromContext(ctx)
  40. uplinkReader, uplinkWriter := pipe.New(opts...)
  41. downlinkReader, downlinkWriter := pipe.New(opts...)
  42. _, err := NewServerWorker(ctx, s.dispatcher, &transport.Link{
  43. Reader: uplinkReader,
  44. Writer: downlinkWriter,
  45. })
  46. if err != nil {
  47. return nil, err
  48. }
  49. return &transport.Link{Reader: downlinkReader, Writer: uplinkWriter}, nil
  50. }
  51. // DispatchLink implements routing.Dispatcher
  52. func (s *Server) DispatchLink(ctx context.Context, dest net.Destination, link *transport.Link) error {
  53. if dest.Address != muxCoolAddress {
  54. return s.dispatcher.DispatchLink(ctx, dest, link)
  55. }
  56. if d, ok := s.dispatcher.(routing.WrapLinkDispatcher); ok {
  57. link = d.WrapLink(ctx, link)
  58. }
  59. worker, err := NewServerWorker(ctx, s.dispatcher, link)
  60. if err != nil {
  61. return err
  62. }
  63. select {
  64. case <-ctx.Done():
  65. case <-worker.done.Wait():
  66. }
  67. return nil
  68. }
  69. // Start implements common.Runnable.
  70. func (s *Server) Start() error {
  71. return nil
  72. }
  73. // Close implements common.Closable.
  74. func (s *Server) Close() error {
  75. return nil
  76. }
  77. type ServerWorker struct {
  78. dispatcher routing.Dispatcher
  79. link *transport.Link
  80. sessionManager *SessionManager
  81. done *done.Instance
  82. timer *time.Ticker
  83. }
  84. func NewServerWorker(ctx context.Context, d routing.Dispatcher, link *transport.Link) (*ServerWorker, error) {
  85. worker := &ServerWorker{
  86. dispatcher: d,
  87. link: link,
  88. sessionManager: NewSessionManager(),
  89. done: done.New(),
  90. timer: time.NewTicker(60 * time.Second),
  91. }
  92. if inbound := session.InboundFromContext(ctx); inbound != nil {
  93. inbound.CanSpliceCopy = 3
  94. }
  95. go worker.run(ctx)
  96. go worker.monitor()
  97. return worker, nil
  98. }
  99. func handle(ctx context.Context, s *Session, output buf.Writer) {
  100. writer := NewResponseWriter(s.ID, output, s.transferType)
  101. if err := buf.Copy(s.input, writer); err != nil {
  102. errors.LogInfoInner(ctx, err, "session ", s.ID, " ends.")
  103. writer.hasError = true
  104. }
  105. writer.Close()
  106. s.Close(false)
  107. }
  108. func (w *ServerWorker) monitor() {
  109. defer w.timer.Stop()
  110. for {
  111. checkSize := w.sessionManager.Size()
  112. checkCount := w.sessionManager.Count()
  113. select {
  114. case <-w.done.Wait():
  115. w.sessionManager.Close()
  116. common.Interrupt(w.link.Writer)
  117. common.Interrupt(w.link.Reader)
  118. return
  119. case <-w.timer.C:
  120. if w.sessionManager.CloseIfNoSessionAndIdle(checkSize, checkCount) {
  121. common.Must(w.done.Close())
  122. }
  123. }
  124. }
  125. }
  126. func (w *ServerWorker) ActiveConnections() uint32 {
  127. return uint32(w.sessionManager.Size())
  128. }
  129. func (w *ServerWorker) Closed() bool {
  130. return w.done.Done()
  131. }
  132. func (w *ServerWorker) WaitClosed() <-chan struct{} {
  133. return w.done.Wait()
  134. }
  135. func (w *ServerWorker) Close() error {
  136. return w.done.Close()
  137. }
  138. func (w *ServerWorker) handleStatusKeepAlive(meta *FrameMetadata, reader *buf.BufferedReader) error {
  139. if meta.Option.Has(OptionData) {
  140. return buf.Copy(NewStreamReader(reader), buf.Discard)
  141. }
  142. return nil
  143. }
  144. func (w *ServerWorker) handleStatusNew(ctx context.Context, meta *FrameMetadata, reader *buf.BufferedReader) error {
  145. ctx = session.SubContextFromMuxInbound(ctx)
  146. if meta.Inbound != nil && meta.Inbound.Source.IsValid() && meta.Inbound.Local.IsValid() {
  147. if inbound := session.InboundFromContext(ctx); inbound != nil {
  148. newInbound := *inbound
  149. newInbound.Source = meta.Inbound.Source
  150. newInbound.Local = meta.Inbound.Local
  151. ctx = session.ContextWithInbound(ctx, &newInbound)
  152. }
  153. }
  154. errors.LogInfo(ctx, "received request for ", meta.Target)
  155. {
  156. msg := &log.AccessMessage{
  157. To: meta.Target,
  158. Status: log.AccessAccepted,
  159. Reason: "",
  160. }
  161. if inbound := session.InboundFromContext(ctx); inbound != nil && inbound.Source.IsValid() {
  162. msg.From = inbound.Source
  163. msg.Email = inbound.User.Email
  164. }
  165. ctx = log.ContextWithAccessMessage(ctx, msg)
  166. }
  167. if network := session.AllowedNetworkFromContext(ctx); network != net.Network_Unknown {
  168. if meta.Target.Network != network {
  169. return errors.New("unexpected network ", meta.Target.Network) // it will break the whole Mux connection
  170. }
  171. }
  172. if meta.GlobalID != [8]byte{} { // MUST ignore empty Global ID
  173. mb, err := NewPacketReader(reader, &meta.Target).ReadMultiBuffer()
  174. if err != nil {
  175. return err
  176. }
  177. XUDPManager.Lock()
  178. x := XUDPManager.Map[meta.GlobalID]
  179. if x == nil {
  180. x = &XUDP{GlobalID: meta.GlobalID}
  181. XUDPManager.Map[meta.GlobalID] = x
  182. XUDPManager.Unlock()
  183. } else {
  184. if x.Status == Initializing { // nearly impossible
  185. XUDPManager.Unlock()
  186. errors.LogWarningInner(ctx, errors.New("conflict"), "XUDP hit ", meta.GlobalID)
  187. // It's not a good idea to return an err here, so just let client wait.
  188. // Client will receive an End frame after sending a Keep frame.
  189. return nil
  190. }
  191. x.Status = Initializing
  192. XUDPManager.Unlock()
  193. x.Mux.Close(false) // detach from previous Mux
  194. b := buf.New()
  195. b.Write(mb[0].Bytes())
  196. b.UDP = mb[0].UDP
  197. if err = x.Mux.output.WriteMultiBuffer(mb); err != nil {
  198. x.Interrupt()
  199. mb = buf.MultiBuffer{b}
  200. } else {
  201. b.Release()
  202. mb = nil
  203. }
  204. errors.LogInfoInner(ctx, err, "XUDP hit ", meta.GlobalID)
  205. }
  206. if mb != nil {
  207. ctx = session.ContextWithTimeoutOnly(ctx, true)
  208. // Actually, it won't return an error in Xray-core's implementations.
  209. link, err := w.dispatcher.Dispatch(ctx, meta.Target)
  210. if err != nil {
  211. XUDPManager.Lock()
  212. delete(XUDPManager.Map, x.GlobalID)
  213. XUDPManager.Unlock()
  214. err = errors.New("XUDP new ", meta.GlobalID).Base(errors.New("failed to dispatch request to ", meta.Target).Base(err))
  215. return err // it will break the whole Mux connection
  216. }
  217. link.Writer.WriteMultiBuffer(mb) // it's meaningless to test a new pipe
  218. x.Mux = &Session{
  219. input: link.Reader,
  220. output: link.Writer,
  221. }
  222. errors.LogInfoInner(ctx, err, "XUDP new ", meta.GlobalID)
  223. }
  224. x.Mux = &Session{
  225. input: x.Mux.input,
  226. output: x.Mux.output,
  227. parent: w.sessionManager,
  228. ID: meta.SessionID,
  229. transferType: protocol.TransferTypePacket,
  230. XUDP: x,
  231. }
  232. x.Status = Active
  233. if !w.sessionManager.Add(x.Mux) {
  234. x.Mux.Close(false)
  235. return errors.New("failed to add new session")
  236. }
  237. go handle(ctx, x.Mux, w.link.Writer)
  238. return nil
  239. }
  240. link, err := w.dispatcher.Dispatch(ctx, meta.Target)
  241. if err != nil {
  242. if meta.Option.Has(OptionData) {
  243. buf.Copy(NewStreamReader(reader), buf.Discard)
  244. }
  245. return errors.New("failed to dispatch request.").Base(err)
  246. }
  247. s := &Session{
  248. input: link.Reader,
  249. output: link.Writer,
  250. parent: w.sessionManager,
  251. ID: meta.SessionID,
  252. transferType: protocol.TransferTypeStream,
  253. }
  254. if meta.Target.Network == net.Network_UDP {
  255. s.transferType = protocol.TransferTypePacket
  256. }
  257. if !w.sessionManager.Add(s) {
  258. s.Close(false)
  259. return errors.New("failed to add new session")
  260. }
  261. go handle(ctx, s, w.link.Writer)
  262. if !meta.Option.Has(OptionData) {
  263. return nil
  264. }
  265. rr := s.NewReader(reader, &meta.Target)
  266. err = buf.Copy(rr, s.output)
  267. if err != nil && buf.IsWriteError(err) {
  268. s.Close(false)
  269. return buf.Copy(rr, buf.Discard)
  270. }
  271. return err
  272. }
  273. func (w *ServerWorker) handleStatusKeep(meta *FrameMetadata, reader *buf.BufferedReader) error {
  274. if !meta.Option.Has(OptionData) {
  275. return nil
  276. }
  277. s, found := w.sessionManager.Get(meta.SessionID)
  278. if !found {
  279. // Notify remote peer to close this session.
  280. closingWriter := NewResponseWriter(meta.SessionID, w.link.Writer, protocol.TransferTypeStream)
  281. closingWriter.Close()
  282. return buf.Copy(NewStreamReader(reader), buf.Discard)
  283. }
  284. rr := s.NewReader(reader, &meta.Target)
  285. err := buf.Copy(rr, s.output)
  286. if err != nil && buf.IsWriteError(err) {
  287. errors.LogInfoInner(context.Background(), err, "failed to write to downstream writer. closing session ", s.ID)
  288. s.Close(false)
  289. return buf.Copy(rr, buf.Discard)
  290. }
  291. return err
  292. }
  293. func (w *ServerWorker) handleStatusEnd(meta *FrameMetadata, reader *buf.BufferedReader) error {
  294. if s, found := w.sessionManager.Get(meta.SessionID); found {
  295. s.Close(false)
  296. }
  297. if meta.Option.Has(OptionData) {
  298. return buf.Copy(NewStreamReader(reader), buf.Discard)
  299. }
  300. return nil
  301. }
  302. func (w *ServerWorker) handleFrame(ctx context.Context, reader *buf.BufferedReader) error {
  303. var meta FrameMetadata
  304. err := meta.Unmarshal(reader, session.IsReverseMuxFromContext(ctx))
  305. if err != nil {
  306. return errors.New("failed to read metadata").Base(err)
  307. }
  308. switch meta.SessionStatus {
  309. case SessionStatusKeepAlive:
  310. err = w.handleStatusKeepAlive(&meta, reader)
  311. case SessionStatusEnd:
  312. err = w.handleStatusEnd(&meta, reader)
  313. case SessionStatusNew:
  314. err = w.handleStatusNew(session.ContextWithIsReverseMux(ctx, false), &meta, reader)
  315. case SessionStatusKeep:
  316. err = w.handleStatusKeep(&meta, reader)
  317. default:
  318. status := meta.SessionStatus
  319. return errors.New("unknown status: ", status).AtError()
  320. }
  321. if err != nil {
  322. return errors.New("failed to process data").Base(err)
  323. }
  324. return nil
  325. }
  326. func (w *ServerWorker) run(ctx context.Context) {
  327. defer func() {
  328. common.Must(w.done.Close())
  329. }()
  330. reader := &buf.BufferedReader{Reader: w.link.Reader}
  331. for {
  332. select {
  333. case <-ctx.Done():
  334. return
  335. default:
  336. err := w.handleFrame(ctx, reader)
  337. if err != nil {
  338. if errors.Cause(err) != io.EOF {
  339. errors.LogInfoInner(ctx, err, "unexpected EOF")
  340. }
  341. return
  342. }
  343. }
  344. }
  345. }