1
0
mirror of https://github.com/v2fly/v2ray-core.git synced 2024-10-30 15:57:35 -04:00
v2fly/tools/conf/transport_internet.go

246 lines
6.8 KiB
Go
Raw Normal View History

2016-10-17 08:35:13 -04:00
package conf
import (
"encoding/json"
"errors"
"fmt"
"io/ioutil"
"strings"
"v2ray.com/core/common/loader"
v2net "v2ray.com/core/common/net"
"v2ray.com/core/transport/internet"
"v2ray.com/core/transport/internet/kcp"
"v2ray.com/core/transport/internet/tcp"
"v2ray.com/core/transport/internet/tls"
"v2ray.com/core/transport/internet/ws"
)
var (
kcpHeaderLoader = NewJSONConfigLoader(ConfigCreatorCache{
"none": func() interface{} { return new(NoOpAuthenticator) },
"srtp": func() interface{} { return new(SRTPAuthenticator) },
"utp": func() interface{} { return new(UTPAuthenticator) },
}, "type", "")
2016-11-04 05:49:18 -04:00
tcpHeaderLoader = NewJSONConfigLoader(ConfigCreatorCache{
2016-11-04 20:15:32 -04:00
"none": func() interface{} { return new(NoOpConnectionAuthenticator) },
2016-11-04 05:49:18 -04:00
"http": func() interface{} { return new(HTTPAuthenticator) },
}, "type", "")
2016-10-17 08:35:13 -04:00
)
type KCPConfig struct {
Mtu *uint32 `json:"mtu"`
Tti *uint32 `json:"tti"`
UpCap *uint32 `json:"uplinkCapacity"`
DownCap *uint32 `json:"downlinkCapacity"`
Congestion *bool `json:"congestion"`
ReadBufferSize *uint32 `json:"readBufferSize"`
WriteBufferSize *uint32 `json:"writeBufferSize"`
HeaderConfig json.RawMessage `json:"header"`
}
2016-11-27 15:39:09 -05:00
func (v *KCPConfig) Build() (*loader.TypedSettings, error) {
2016-10-17 08:35:13 -04:00
config := new(kcp.Config)
2016-11-27 15:39:09 -05:00
if v.Mtu != nil {
mtu := *v.Mtu
2016-10-17 08:35:13 -04:00
if mtu < 576 || mtu > 1460 {
return nil, fmt.Errorf("KCP|Config: Invalid MTU size: %d", mtu)
}
config.Mtu = &kcp.MTU{Value: mtu}
}
2016-11-27 15:39:09 -05:00
if v.Tti != nil {
tti := *v.Tti
2016-10-17 08:35:13 -04:00
if tti < 10 || tti > 100 {
return nil, fmt.Errorf("KCP|Config: Invalid TTI: %d", tti)
}
config.Tti = &kcp.TTI{Value: tti}
}
2016-11-27 15:39:09 -05:00
if v.UpCap != nil {
config.UplinkCapacity = &kcp.UplinkCapacity{Value: *v.UpCap}
2016-10-17 08:35:13 -04:00
}
2016-11-27 15:39:09 -05:00
if v.DownCap != nil {
config.DownlinkCapacity = &kcp.DownlinkCapacity{Value: *v.DownCap}
2016-10-17 08:35:13 -04:00
}
2016-11-27 15:39:09 -05:00
if v.Congestion != nil {
config.Congestion = *v.Congestion
2016-10-17 08:35:13 -04:00
}
2016-11-27 15:39:09 -05:00
if v.ReadBufferSize != nil {
size := *v.ReadBufferSize
2016-10-17 08:35:13 -04:00
if size > 0 {
config.ReadBuffer = &kcp.ReadBuffer{Size: size * 1024 * 1024}
} else {
config.ReadBuffer = &kcp.ReadBuffer{Size: 512 * 1024}
}
}
2016-11-27 15:39:09 -05:00
if v.WriteBufferSize != nil {
size := *v.WriteBufferSize
2016-10-17 08:35:13 -04:00
if size > 0 {
config.WriteBuffer = &kcp.WriteBuffer{Size: size * 1024 * 1024}
} else {
config.WriteBuffer = &kcp.WriteBuffer{Size: 512 * 1024}
}
}
2016-11-27 15:39:09 -05:00
if len(v.HeaderConfig) > 0 {
headerConfig, _, err := kcpHeaderLoader.Load(v.HeaderConfig)
2016-10-17 08:35:13 -04:00
if err != nil {
return nil, errors.New("KCP|Config: Failed to parse header config: " + err.Error())
}
ts, err := headerConfig.(Buildable).Build()
if err != nil {
return nil, errors.New("Failed to get KCP authenticator config: " + err.Error())
}
config.HeaderConfig = ts
}
return loader.NewTypedSettings(config), nil
}
type TCPConfig struct {
2016-11-04 05:49:18 -04:00
ConnectionReuse *bool `json:"connectionReuse"`
HeaderConfig json.RawMessage `json:"header"`
2016-10-17 08:35:13 -04:00
}
2016-11-27 15:39:09 -05:00
func (v *TCPConfig) Build() (*loader.TypedSettings, error) {
2016-10-17 08:35:13 -04:00
config := new(tcp.Config)
2016-11-27 15:39:09 -05:00
if v.ConnectionReuse != nil {
2016-10-17 08:35:13 -04:00
config.ConnectionReuse = &tcp.ConnectionReuse{
2016-11-27 15:39:09 -05:00
Enable: *v.ConnectionReuse,
2016-10-17 08:35:13 -04:00
}
}
2016-11-27 15:39:09 -05:00
if len(v.HeaderConfig) > 0 {
headerConfig, _, err := tcpHeaderLoader.Load(v.HeaderConfig)
2016-11-04 05:49:18 -04:00
if err != nil {
return nil, errors.New("TCP|Config: Failed to parse header config: " + err.Error())
}
ts, err := headerConfig.(Buildable).Build()
if err != nil {
return nil, errors.New("Failed to get TCP authenticator config: " + err.Error())
}
config.HeaderSettings = ts
}
2016-10-17 08:35:13 -04:00
return loader.NewTypedSettings(config), nil
}
type WebSocketConfig struct {
ConnectionReuse *bool `json:"connectionReuse"`
Path string `json:"Path"`
}
2016-11-27 15:39:09 -05:00
func (v *WebSocketConfig) Build() (*loader.TypedSettings, error) {
2016-10-17 08:35:13 -04:00
config := &ws.Config{
2016-11-27 15:39:09 -05:00
Path: v.Path,
2016-10-17 08:35:13 -04:00
}
2016-11-27 15:39:09 -05:00
if v.ConnectionReuse != nil {
2016-10-17 08:35:13 -04:00
config.ConnectionReuse = &ws.ConnectionReuse{
2016-11-27 15:39:09 -05:00
Enable: *v.ConnectionReuse,
2016-10-17 08:35:13 -04:00
}
}
return loader.NewTypedSettings(config), nil
}
type TLSCertConfig struct {
CertFile string `json:"certificateFile"`
KeyFile string `json:"keyFile"`
}
type TLSConfig struct {
Insecure bool `json:"allowInsecure"`
Certs []*TLSCertConfig `json:"certificates"`
}
2016-11-27 15:39:09 -05:00
func (v *TLSConfig) Build() (*loader.TypedSettings, error) {
2016-10-17 08:35:13 -04:00
config := new(tls.Config)
2016-11-27 15:39:09 -05:00
config.Certificate = make([]*tls.Certificate, len(v.Certs))
for idx, certConf := range v.Certs {
2016-10-17 08:35:13 -04:00
cert, err := ioutil.ReadFile(certConf.CertFile)
if err != nil {
return nil, errors.New("TLS: Failed to load certificate file: " + err.Error())
}
key, err := ioutil.ReadFile(certConf.KeyFile)
if err != nil {
return nil, errors.New("TLS: Failed to load key file: " + err.Error())
}
config.Certificate[idx] = &tls.Certificate{
Key: key,
Certificate: cert,
}
}
2016-11-27 15:39:09 -05:00
config.AllowInsecure = v.Insecure
2016-10-17 08:35:13 -04:00
return loader.NewTypedSettings(config), nil
}
type StreamConfig struct {
2016-10-18 15:57:40 -04:00
Network *Network `json:"network"`
Security string `json:"security"`
TLSSettings *TLSConfig `json:"tlsSettings"`
TCPSettings *TCPConfig `json:"tcpSettings"`
KCPSettings *KCPConfig `json:"kcpSettings"`
WSSettings *WebSocketConfig `json:"wsSettings"`
2016-10-17 08:35:13 -04:00
}
2016-11-27 15:39:09 -05:00
func (v *StreamConfig) Build() (*internet.StreamConfig, error) {
2016-10-17 08:35:13 -04:00
config := &internet.StreamConfig{
Network: v2net.Network_RawTCP,
}
2016-11-27 15:39:09 -05:00
if v.Network != nil {
config.Network = (*v.Network).Build()
2016-10-17 08:35:13 -04:00
}
2016-11-27 15:39:09 -05:00
if strings.ToLower(v.Security) == "tls" {
tlsSettings := v.TLSSettings
2016-10-17 08:35:13 -04:00
if tlsSettings == nil {
tlsSettings = &TLSConfig{}
}
ts, err := tlsSettings.Build()
if err != nil {
return nil, errors.New("Failed to build TLS config: " + err.Error())
}
config.SecuritySettings = append(config.SecuritySettings, ts)
}
2016-11-27 15:39:09 -05:00
if v.TCPSettings != nil {
ts, err := v.TCPSettings.Build()
2016-10-18 15:57:40 -04:00
if err != nil {
return nil, errors.New("Failed to build TCP config: " + err.Error())
}
config.NetworkSettings = append(config.NetworkSettings, &internet.NetworkSettings{
Network: v2net.Network_TCP,
Settings: ts,
})
}
2016-11-27 15:39:09 -05:00
if v.KCPSettings != nil {
ts, err := v.KCPSettings.Build()
2016-10-18 15:57:40 -04:00
if err != nil {
return nil, errors.New("Failed to build KCP config: " + err.Error())
}
config.NetworkSettings = append(config.NetworkSettings, &internet.NetworkSettings{
Network: v2net.Network_KCP,
Settings: ts,
})
}
2016-11-27 15:39:09 -05:00
if v.WSSettings != nil {
ts, err := v.WSSettings.Build()
2016-10-18 15:57:40 -04:00
if err != nil {
return nil, errors.New("Failed to build WebSocket config: " + err.Error())
}
config.NetworkSettings = append(config.NetworkSettings, &internet.NetworkSettings{
Network: v2net.Network_WebSocket,
Settings: ts,
})
}
2016-10-17 08:35:13 -04:00
return config, nil
}
2016-11-10 17:41:28 -05:00
type ProxyConfig struct {
Tag string `json:"tag"`
}
2016-11-27 15:39:09 -05:00
func (v *ProxyConfig) Build() (*internet.ProxyConfig, error) {
if len(v.Tag) == 0 {
2016-11-10 17:41:28 -05:00
return nil, errors.New("Proxy tag is not set.")
}
return &internet.ProxyConfig{
2016-11-27 15:39:09 -05:00
Tag: v.Tag,
2016-11-10 17:41:28 -05:00
}, nil
}