dokodemo.go 8.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348
  1. package dokodemo
  2. import (
  3. "context"
  4. "runtime"
  5. "strconv"
  6. "strings"
  7. "sync/atomic"
  8. "github.com/xtls/xray-core/common"
  9. "github.com/xtls/xray-core/common/buf"
  10. "github.com/xtls/xray-core/common/errors"
  11. "github.com/xtls/xray-core/common/log"
  12. "github.com/xtls/xray-core/common/net"
  13. "github.com/xtls/xray-core/common/protocol"
  14. "github.com/xtls/xray-core/common/session"
  15. "github.com/xtls/xray-core/common/signal"
  16. "github.com/xtls/xray-core/common/task"
  17. "github.com/xtls/xray-core/core"
  18. "github.com/xtls/xray-core/features/policy"
  19. "github.com/xtls/xray-core/features/routing"
  20. "github.com/xtls/xray-core/transport/internet/stat"
  21. "github.com/xtls/xray-core/transport/internet/tls"
  22. )
  23. func init() {
  24. common.Must(common.RegisterConfig((*Config)(nil), func(ctx context.Context, config interface{}) (interface{}, error) {
  25. d := new(DokodemoDoor)
  26. err := core.RequireFeatures(ctx, func(pm policy.Manager) error {
  27. return d.Init(config.(*Config), pm, session.SockoptFromContext(ctx))
  28. })
  29. return d, err
  30. }))
  31. }
  32. type DokodemoDoor struct {
  33. policyManager policy.Manager
  34. config *Config
  35. address net.Address
  36. port net.Port
  37. portMap map[string]string
  38. sockopt *session.Sockopt
  39. }
  40. // Init initializes the DokodemoDoor instance with necessary parameters.
  41. func (d *DokodemoDoor) Init(config *Config, pm policy.Manager, sockopt *session.Sockopt) error {
  42. if len(config.Networks) == 0 {
  43. return errors.New("no network specified")
  44. }
  45. d.config = config
  46. d.address = config.GetPredefinedAddress()
  47. d.port = net.Port(config.Port)
  48. d.portMap = config.PortMap
  49. d.policyManager = pm
  50. d.sockopt = sockopt
  51. return nil
  52. }
  53. // Network implements proxy.Inbound.
  54. func (d *DokodemoDoor) Network() []net.Network {
  55. return d.config.Networks
  56. }
  57. func (d *DokodemoDoor) policy() policy.Session {
  58. config := d.config
  59. p := d.policyManager.ForLevel(config.UserLevel)
  60. return p
  61. }
  62. // Process implements proxy.Inbound.
  63. func (d *DokodemoDoor) Process(ctx context.Context, network net.Network, conn stat.Connection, dispatcher routing.Dispatcher) error {
  64. errors.LogDebug(ctx, "processing connection from: ", conn.RemoteAddr())
  65. dest := net.Destination{
  66. Network: network,
  67. Address: d.address,
  68. Port: d.port,
  69. }
  70. if !d.config.FollowRedirect {
  71. host, port, err := net.SplitHostPort(conn.LocalAddr().String())
  72. if dest.Address == nil {
  73. if err != nil {
  74. dest.Address = net.DomainAddress("localhost")
  75. } else {
  76. if strings.Contains(host, ".") {
  77. dest.Address = net.LocalHostIP
  78. } else {
  79. dest.Address = net.LocalHostIPv6
  80. }
  81. }
  82. }
  83. if dest.Port == 0 {
  84. dest.Port = net.Port(common.Must2(strconv.Atoi(port)))
  85. }
  86. if d.portMap != nil && d.portMap[port] != "" {
  87. h, p, _ := net.SplitHostPort(d.portMap[port])
  88. if len(h) > 0 {
  89. dest.Address = net.ParseAddress(h)
  90. }
  91. if len(p) > 0 {
  92. dest.Port = net.Port(common.Must2(strconv.Atoi(p)))
  93. }
  94. }
  95. }
  96. destinationOverridden := false
  97. if d.config.FollowRedirect {
  98. outbounds := session.OutboundsFromContext(ctx)
  99. if len(outbounds) > 0 {
  100. ob := outbounds[len(outbounds)-1]
  101. if ob.Target.IsValid() {
  102. dest = ob.Target
  103. destinationOverridden = true
  104. }
  105. }
  106. if tlsConn, ok := conn.(tls.Interface); ok && !destinationOverridden {
  107. if serverName := tlsConn.HandshakeContextServerName(ctx); serverName != "" {
  108. dest.Address = net.DomainAddress(serverName)
  109. destinationOverridden = true
  110. ctx = session.ContextWithMitmServerName(ctx, serverName)
  111. }
  112. if tlsConn.NegotiatedProtocol() != "h2" {
  113. ctx = session.ContextWithMitmAlpn11(ctx, true)
  114. }
  115. }
  116. }
  117. if !dest.IsValid() || dest.Address == nil {
  118. return errors.New("unable to get destination")
  119. }
  120. inbound := session.InboundFromContext(ctx)
  121. inbound.Name = "dokodemo-door"
  122. inbound.CanSpliceCopy = 1
  123. inbound.User = &protocol.MemoryUser{
  124. Level: d.config.UserLevel,
  125. }
  126. ctx = log.ContextWithAccessMessage(ctx, &log.AccessMessage{
  127. From: conn.RemoteAddr(),
  128. To: dest,
  129. Status: log.AccessAccepted,
  130. Reason: "",
  131. })
  132. errors.LogInfo(ctx, "received request for ", conn.RemoteAddr())
  133. plcy := d.policy()
  134. ctx, cancel := context.WithCancel(ctx)
  135. timer := signal.CancelAfterInactivity(ctx, cancel, plcy.Timeouts.ConnectionIdle)
  136. if inbound != nil {
  137. inbound.Timer = timer
  138. }
  139. ctx = policy.ContextWithBufferPolicy(ctx, plcy.Buffer)
  140. link, err := dispatcher.Dispatch(ctx, dest)
  141. if err != nil {
  142. return errors.New("failed to dispatch request").Base(err)
  143. }
  144. requestCount := int32(1)
  145. requestDone := func() error {
  146. defer func() {
  147. if atomic.AddInt32(&requestCount, -1) == 0 {
  148. timer.SetTimeout(plcy.Timeouts.DownlinkOnly)
  149. }
  150. }()
  151. var reader buf.Reader
  152. if dest.Network == net.Network_UDP {
  153. reader = buf.NewPacketReader(conn)
  154. } else {
  155. reader = buf.NewReader(conn)
  156. }
  157. if err := buf.Copy(reader, link.Writer, buf.UpdateActivity(timer)); err != nil {
  158. return errors.New("failed to transport request").Base(err)
  159. }
  160. return nil
  161. }
  162. var writer buf.Writer
  163. if network == net.Network_TCP {
  164. writer = buf.NewWriter(conn)
  165. } else {
  166. // if we are in TPROXY mode, use linux's udp forging functionality
  167. if !destinationOverridden {
  168. writer = &buf.SequentialWriter{Writer: conn}
  169. } else {
  170. back := conn.RemoteAddr().(*net.UDPAddr)
  171. if !dest.Address.Family().IsIP() {
  172. if len(back.IP) == 4 {
  173. dest.Address = net.AnyIP
  174. } else {
  175. dest.Address = net.AnyIPv6
  176. }
  177. }
  178. addr := &net.UDPAddr{
  179. IP: dest.Address.IP(),
  180. Port: int(dest.Port),
  181. }
  182. var mark int
  183. if d.sockopt != nil {
  184. mark = int(d.sockopt.Mark)
  185. }
  186. pConn, err := FakeUDP(addr, mark)
  187. if err != nil {
  188. return err
  189. }
  190. writer = NewPacketWriter(pConn, &dest, mark, back)
  191. defer func() {
  192. runtime.Gosched()
  193. common.Interrupt(link.Reader) // maybe duplicated
  194. runtime.Gosched()
  195. writer.(*PacketWriter).Close() // close fake UDP conns
  196. }()
  197. /*
  198. sockopt := &internet.SocketConfig{
  199. Tproxy: internet.SocketConfig_TProxy,
  200. }
  201. if dest.Address.Family().IsIP() {
  202. sockopt.BindAddress = dest.Address.IP()
  203. sockopt.BindPort = uint32(dest.Port)
  204. }
  205. if d.sockopt != nil {
  206. sockopt.Mark = d.sockopt.Mark
  207. }
  208. tConn, err := internet.DialSystem(ctx, net.DestinationFromAddr(conn.RemoteAddr()), sockopt)
  209. if err != nil {
  210. return err
  211. }
  212. defer tConn.Close()
  213. writer = &buf.SequentialWriter{Writer: tConn}
  214. tReader := buf.NewPacketReader(tConn)
  215. requestCount++
  216. tproxyRequest = func() error {
  217. defer func() {
  218. if atomic.AddInt32(&requestCount, -1) == 0 {
  219. timer.SetTimeout(plcy.Timeouts.DownlinkOnly)
  220. }
  221. }()
  222. if err := buf.Copy(tReader, link.Writer, buf.UpdateActivity(timer)); err != nil {
  223. return errors.New("failed to transport request (TPROXY conn)").Base(err)
  224. }
  225. return nil
  226. }
  227. */
  228. }
  229. }
  230. responseDone := func() error {
  231. defer timer.SetTimeout(plcy.Timeouts.UplinkOnly)
  232. if network == net.Network_UDP && destinationOverridden {
  233. buf.Copy(link.Reader, writer) // respect upload's timeout
  234. return nil
  235. }
  236. if err := buf.Copy(link.Reader, writer, buf.UpdateActivity(timer)); err != nil {
  237. return errors.New("failed to transport response").Base(err)
  238. }
  239. return nil
  240. }
  241. if err := task.Run(ctx,
  242. task.OnSuccess(func() error { return task.Run(ctx, requestDone) }, task.Close(link.Writer)),
  243. responseDone); err != nil {
  244. runtime.Gosched()
  245. common.Interrupt(link.Writer)
  246. runtime.Gosched()
  247. common.Interrupt(link.Reader)
  248. return errors.New("connection ends").Base(err)
  249. }
  250. return nil
  251. }
  252. func NewPacketWriter(conn net.PacketConn, d *net.Destination, mark int, back *net.UDPAddr) buf.Writer {
  253. writer := &PacketWriter{
  254. conn: conn,
  255. conns: make(map[net.Destination]net.PacketConn),
  256. mark: mark,
  257. back: back,
  258. }
  259. writer.conns[*d] = conn
  260. return writer
  261. }
  262. type PacketWriter struct {
  263. conn net.PacketConn
  264. conns map[net.Destination]net.PacketConn
  265. mark int
  266. back *net.UDPAddr
  267. }
  268. func (w *PacketWriter) WriteMultiBuffer(mb buf.MultiBuffer) error {
  269. for {
  270. mb2, b := buf.SplitFirst(mb)
  271. mb = mb2
  272. if b == nil {
  273. break
  274. }
  275. var err error
  276. if b.UDP != nil && b.UDP.Address.Family().IsIP() {
  277. conn := w.conns[*b.UDP]
  278. if conn == nil {
  279. conn, err = FakeUDP(
  280. &net.UDPAddr{
  281. IP: b.UDP.Address.IP(),
  282. Port: int(b.UDP.Port),
  283. },
  284. w.mark,
  285. )
  286. if err != nil {
  287. errors.LogInfo(context.Background(), err.Error())
  288. b.Release()
  289. continue
  290. }
  291. w.conns[*b.UDP] = conn
  292. }
  293. _, err = conn.WriteTo(b.Bytes(), w.back)
  294. if err != nil {
  295. errors.LogInfo(context.Background(), err.Error())
  296. w.conns[*b.UDP] = nil
  297. conn.Close()
  298. }
  299. b.Release()
  300. } else {
  301. _, err = w.conn.WriteTo(b.Bytes(), w.back)
  302. b.Release()
  303. if err != nil {
  304. buf.ReleaseMulti(mb)
  305. return err
  306. }
  307. }
  308. }
  309. return nil
  310. }
  311. func (w *PacketWriter) Close() error {
  312. for _, conn := range w.conns {
  313. if conn != nil {
  314. conn.Close()
  315. }
  316. }
  317. return nil
  318. }