server.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386
  1. package mux
  2. import (
  3. "context"
  4. "io"
  5. "time"
  6. "github.com/xtls/xray-core/app/dispatcher"
  7. "github.com/xtls/xray-core/common"
  8. "github.com/xtls/xray-core/common/buf"
  9. "github.com/xtls/xray-core/common/errors"
  10. "github.com/xtls/xray-core/common/log"
  11. "github.com/xtls/xray-core/common/net"
  12. "github.com/xtls/xray-core/common/protocol"
  13. "github.com/xtls/xray-core/common/session"
  14. "github.com/xtls/xray-core/common/signal/done"
  15. "github.com/xtls/xray-core/core"
  16. "github.com/xtls/xray-core/features/routing"
  17. "github.com/xtls/xray-core/transport"
  18. "github.com/xtls/xray-core/transport/pipe"
  19. )
  20. type Server struct {
  21. dispatcher routing.Dispatcher
  22. }
  23. // NewServer creates a new mux.Server.
  24. func NewServer(ctx context.Context) *Server {
  25. s := &Server{}
  26. core.RequireFeatures(ctx, func(d routing.Dispatcher) {
  27. s.dispatcher = d
  28. })
  29. return s
  30. }
  31. // Type implements common.HasType.
  32. func (s *Server) Type() interface{} {
  33. return s.dispatcher.Type()
  34. }
  35. // Dispatch implements routing.Dispatcher
  36. func (s *Server) Dispatch(ctx context.Context, dest net.Destination) (*transport.Link, error) {
  37. if dest.Address != muxCoolAddress {
  38. return s.dispatcher.Dispatch(ctx, dest)
  39. }
  40. opts := pipe.OptionsFromContext(ctx)
  41. uplinkReader, uplinkWriter := pipe.New(opts...)
  42. downlinkReader, downlinkWriter := pipe.New(opts...)
  43. _, err := NewServerWorker(ctx, s.dispatcher, &transport.Link{
  44. Reader: uplinkReader,
  45. Writer: downlinkWriter,
  46. })
  47. if err != nil {
  48. return nil, err
  49. }
  50. return &transport.Link{Reader: downlinkReader, Writer: uplinkWriter}, nil
  51. }
  52. // DispatchLink implements routing.Dispatcher
  53. func (s *Server) DispatchLink(ctx context.Context, dest net.Destination, link *transport.Link) error {
  54. if dest.Address != muxCoolAddress {
  55. return s.dispatcher.DispatchLink(ctx, dest, link)
  56. }
  57. link = s.dispatcher.(*dispatcher.DefaultDispatcher).WrapLink(ctx, link)
  58. worker, err := NewServerWorker(ctx, s.dispatcher, link)
  59. if err != nil {
  60. return err
  61. }
  62. select {
  63. case <-ctx.Done():
  64. case <-worker.done.Wait():
  65. }
  66. return nil
  67. }
  68. // Start implements common.Runnable.
  69. func (s *Server) Start() error {
  70. return nil
  71. }
  72. // Close implements common.Closable.
  73. func (s *Server) Close() error {
  74. return nil
  75. }
  76. type ServerWorker struct {
  77. dispatcher routing.Dispatcher
  78. link *transport.Link
  79. sessionManager *SessionManager
  80. done *done.Instance
  81. timer *time.Ticker
  82. }
  83. func NewServerWorker(ctx context.Context, d routing.Dispatcher, link *transport.Link) (*ServerWorker, error) {
  84. worker := &ServerWorker{
  85. dispatcher: d,
  86. link: link,
  87. sessionManager: NewSessionManager(),
  88. done: done.New(),
  89. timer: time.NewTicker(60 * time.Second),
  90. }
  91. if inbound := session.InboundFromContext(ctx); inbound != nil {
  92. inbound.CanSpliceCopy = 3
  93. }
  94. go worker.run(ctx)
  95. go worker.monitor()
  96. return worker, nil
  97. }
  98. func handle(ctx context.Context, s *Session, output buf.Writer) {
  99. writer := NewResponseWriter(s.ID, output, s.transferType)
  100. if err := buf.Copy(s.input, writer); err != nil {
  101. errors.LogInfoInner(ctx, err, "session ", s.ID, " ends.")
  102. writer.hasError = true
  103. }
  104. writer.Close()
  105. s.Close(false)
  106. }
  107. func (w *ServerWorker) monitor() {
  108. defer w.timer.Stop()
  109. for {
  110. checkSize := w.sessionManager.Size()
  111. checkCount := w.sessionManager.Count()
  112. select {
  113. case <-w.done.Wait():
  114. w.sessionManager.Close()
  115. common.Interrupt(w.link.Writer)
  116. common.Interrupt(w.link.Reader)
  117. return
  118. case <-w.timer.C:
  119. if w.sessionManager.CloseIfNoSessionAndIdle(checkSize, checkCount) {
  120. common.Must(w.done.Close())
  121. }
  122. }
  123. }
  124. }
  125. func (w *ServerWorker) ActiveConnections() uint32 {
  126. return uint32(w.sessionManager.Size())
  127. }
  128. func (w *ServerWorker) Closed() bool {
  129. return w.done.Done()
  130. }
  131. func (w *ServerWorker) WaitClosed() <-chan struct{} {
  132. return w.done.Wait()
  133. }
  134. func (w *ServerWorker) Close() error {
  135. return w.done.Close()
  136. }
  137. func (w *ServerWorker) handleStatusKeepAlive(meta *FrameMetadata, reader *buf.BufferedReader) error {
  138. if meta.Option.Has(OptionData) {
  139. return buf.Copy(NewStreamReader(reader), buf.Discard)
  140. }
  141. return nil
  142. }
  143. func (w *ServerWorker) handleStatusNew(ctx context.Context, meta *FrameMetadata, reader *buf.BufferedReader) error {
  144. ctx = session.SubContextFromMuxInbound(ctx)
  145. if meta.Inbound != nil && meta.Inbound.Source.IsValid() && meta.Inbound.Local.IsValid() {
  146. if inbound := session.InboundFromContext(ctx); inbound != nil {
  147. newInbound := *inbound
  148. newInbound.Source = meta.Inbound.Source
  149. newInbound.Local = meta.Inbound.Local
  150. ctx = session.ContextWithInbound(ctx, &newInbound)
  151. }
  152. }
  153. errors.LogInfo(ctx, "received request for ", meta.Target)
  154. {
  155. msg := &log.AccessMessage{
  156. To: meta.Target,
  157. Status: log.AccessAccepted,
  158. Reason: "",
  159. }
  160. if inbound := session.InboundFromContext(ctx); inbound != nil && inbound.Source.IsValid() {
  161. msg.From = inbound.Source
  162. msg.Email = inbound.User.Email
  163. }
  164. ctx = log.ContextWithAccessMessage(ctx, msg)
  165. }
  166. if network := session.AllowedNetworkFromContext(ctx); network != net.Network_Unknown {
  167. if meta.Target.Network != network {
  168. return errors.New("unexpected network ", meta.Target.Network) // it will break the whole Mux connection
  169. }
  170. }
  171. if meta.GlobalID != [8]byte{} { // MUST ignore empty Global ID
  172. mb, err := NewPacketReader(reader, &meta.Target).ReadMultiBuffer()
  173. if err != nil {
  174. return err
  175. }
  176. XUDPManager.Lock()
  177. x := XUDPManager.Map[meta.GlobalID]
  178. if x == nil {
  179. x = &XUDP{GlobalID: meta.GlobalID}
  180. XUDPManager.Map[meta.GlobalID] = x
  181. XUDPManager.Unlock()
  182. } else {
  183. if x.Status == Initializing { // nearly impossible
  184. XUDPManager.Unlock()
  185. errors.LogWarningInner(ctx, errors.New("conflict"), "XUDP hit ", meta.GlobalID)
  186. // It's not a good idea to return an err here, so just let client wait.
  187. // Client will receive an End frame after sending a Keep frame.
  188. return nil
  189. }
  190. x.Status = Initializing
  191. XUDPManager.Unlock()
  192. x.Mux.Close(false) // detach from previous Mux
  193. b := buf.New()
  194. b.Write(mb[0].Bytes())
  195. b.UDP = mb[0].UDP
  196. if err = x.Mux.output.WriteMultiBuffer(mb); err != nil {
  197. x.Interrupt()
  198. mb = buf.MultiBuffer{b}
  199. } else {
  200. b.Release()
  201. mb = nil
  202. }
  203. errors.LogInfoInner(ctx, err, "XUDP hit ", meta.GlobalID)
  204. }
  205. if mb != nil {
  206. ctx = session.ContextWithTimeoutOnly(ctx, true)
  207. // Actually, it won't return an error in Xray-core's implementations.
  208. link, err := w.dispatcher.Dispatch(ctx, meta.Target)
  209. if err != nil {
  210. XUDPManager.Lock()
  211. delete(XUDPManager.Map, x.GlobalID)
  212. XUDPManager.Unlock()
  213. err = errors.New("XUDP new ", meta.GlobalID).Base(errors.New("failed to dispatch request to ", meta.Target).Base(err))
  214. return err // it will break the whole Mux connection
  215. }
  216. link.Writer.WriteMultiBuffer(mb) // it's meaningless to test a new pipe
  217. x.Mux = &Session{
  218. input: link.Reader,
  219. output: link.Writer,
  220. }
  221. errors.LogInfoInner(ctx, err, "XUDP new ", meta.GlobalID)
  222. }
  223. x.Mux = &Session{
  224. input: x.Mux.input,
  225. output: x.Mux.output,
  226. parent: w.sessionManager,
  227. ID: meta.SessionID,
  228. transferType: protocol.TransferTypePacket,
  229. XUDP: x,
  230. }
  231. x.Status = Active
  232. if !w.sessionManager.Add(x.Mux) {
  233. x.Mux.Close(false)
  234. return errors.New("failed to add new session")
  235. }
  236. go handle(ctx, x.Mux, w.link.Writer)
  237. return nil
  238. }
  239. link, err := w.dispatcher.Dispatch(ctx, meta.Target)
  240. if err != nil {
  241. if meta.Option.Has(OptionData) {
  242. buf.Copy(NewStreamReader(reader), buf.Discard)
  243. }
  244. return errors.New("failed to dispatch request.").Base(err)
  245. }
  246. s := &Session{
  247. input: link.Reader,
  248. output: link.Writer,
  249. parent: w.sessionManager,
  250. ID: meta.SessionID,
  251. transferType: protocol.TransferTypeStream,
  252. }
  253. if meta.Target.Network == net.Network_UDP {
  254. s.transferType = protocol.TransferTypePacket
  255. }
  256. if !w.sessionManager.Add(s) {
  257. s.Close(false)
  258. return errors.New("failed to add new session")
  259. }
  260. go handle(ctx, s, w.link.Writer)
  261. if !meta.Option.Has(OptionData) {
  262. return nil
  263. }
  264. rr := s.NewReader(reader, &meta.Target)
  265. err = buf.Copy(rr, s.output)
  266. if err != nil && buf.IsWriteError(err) {
  267. s.Close(false)
  268. return buf.Copy(rr, buf.Discard)
  269. }
  270. return err
  271. }
  272. func (w *ServerWorker) handleStatusKeep(meta *FrameMetadata, reader *buf.BufferedReader) error {
  273. if !meta.Option.Has(OptionData) {
  274. return nil
  275. }
  276. s, found := w.sessionManager.Get(meta.SessionID)
  277. if !found {
  278. // Notify remote peer to close this session.
  279. closingWriter := NewResponseWriter(meta.SessionID, w.link.Writer, protocol.TransferTypeStream)
  280. closingWriter.Close()
  281. return buf.Copy(NewStreamReader(reader), buf.Discard)
  282. }
  283. rr := s.NewReader(reader, &meta.Target)
  284. err := buf.Copy(rr, s.output)
  285. if err != nil && buf.IsWriteError(err) {
  286. errors.LogInfoInner(context.Background(), err, "failed to write to downstream writer. closing session ", s.ID)
  287. s.Close(false)
  288. return buf.Copy(rr, buf.Discard)
  289. }
  290. return err
  291. }
  292. func (w *ServerWorker) handleStatusEnd(meta *FrameMetadata, reader *buf.BufferedReader) error {
  293. if s, found := w.sessionManager.Get(meta.SessionID); found {
  294. s.Close(false)
  295. }
  296. if meta.Option.Has(OptionData) {
  297. return buf.Copy(NewStreamReader(reader), buf.Discard)
  298. }
  299. return nil
  300. }
  301. func (w *ServerWorker) handleFrame(ctx context.Context, reader *buf.BufferedReader) error {
  302. var meta FrameMetadata
  303. err := meta.Unmarshal(reader, session.IsReverseMuxFromContext(ctx))
  304. if err != nil {
  305. return errors.New("failed to read metadata").Base(err)
  306. }
  307. switch meta.SessionStatus {
  308. case SessionStatusKeepAlive:
  309. err = w.handleStatusKeepAlive(&meta, reader)
  310. case SessionStatusEnd:
  311. err = w.handleStatusEnd(&meta, reader)
  312. case SessionStatusNew:
  313. err = w.handleStatusNew(session.ContextWithIsReverseMux(ctx, false), &meta, reader)
  314. case SessionStatusKeep:
  315. err = w.handleStatusKeep(&meta, reader)
  316. default:
  317. status := meta.SessionStatus
  318. return errors.New("unknown status: ", status).AtError()
  319. }
  320. if err != nil {
  321. return errors.New("failed to process data").Base(err)
  322. }
  323. return nil
  324. }
  325. func (w *ServerWorker) run(ctx context.Context) {
  326. defer func() {
  327. common.Must(w.done.Close())
  328. }()
  329. reader := &buf.BufferedReader{Reader: w.link.Reader}
  330. for {
  331. select {
  332. case <-ctx.Done():
  333. return
  334. default:
  335. err := w.handleFrame(ctx, reader)
  336. if err != nil {
  337. if errors.Cause(err) != io.EOF {
  338. errors.LogInfoInner(ctx, err, "unexpected EOF")
  339. }
  340. return
  341. }
  342. }
  343. }
  344. }