2015-09-11 08:12:09 -04:00
|
|
|
package freedom
|
2015-09-09 11:39:06 -04:00
|
|
|
|
2017-12-02 19:04:57 -05:00
|
|
|
//go:generate go run $GOPATH/src/v2ray.com/core/common/errors/errorgen/main.go -pkg freedom -path Proxy,Freedom
|
2017-04-08 19:43:25 -04:00
|
|
|
|
2015-09-09 11:39:06 -04:00
|
|
|
import (
|
2017-01-12 18:56:21 -05:00
|
|
|
"context"
|
2018-01-10 06:22:37 -05:00
|
|
|
"time"
|
2016-12-09 07:17:34 -05:00
|
|
|
|
2018-01-10 06:22:37 -05:00
|
|
|
"v2ray.com/core"
|
2016-12-27 18:53:29 -05:00
|
|
|
"v2ray.com/core/common"
|
2016-12-09 05:35:27 -05:00
|
|
|
"v2ray.com/core/common/buf"
|
2016-08-20 14:55:45 -04:00
|
|
|
"v2ray.com/core/common/dice"
|
2017-01-13 17:42:39 -05:00
|
|
|
"v2ray.com/core/common/net"
|
2016-08-20 14:55:45 -04:00
|
|
|
"v2ray.com/core/common/retry"
|
2018-06-24 19:09:02 -04:00
|
|
|
"v2ray.com/core/common/session"
|
2016-12-29 18:32:20 -05:00
|
|
|
"v2ray.com/core/common/signal"
|
2018-05-27 07:02:29 -04:00
|
|
|
"v2ray.com/core/common/task"
|
2016-08-20 14:55:45 -04:00
|
|
|
"v2ray.com/core/proxy"
|
|
|
|
"v2ray.com/core/transport/internet"
|
2015-09-09 11:39:06 -04:00
|
|
|
)
|
|
|
|
|
2017-11-15 12:28:39 -05:00
|
|
|
// Handler handles Freedom connections.
|
2016-12-22 07:33:28 -05:00
|
|
|
type Handler struct {
|
2018-01-10 06:22:37 -05:00
|
|
|
policyManager core.PolicyManager
|
|
|
|
dns core.DNSClient
|
|
|
|
config Config
|
2016-05-22 16:30:21 -04:00
|
|
|
}
|
|
|
|
|
2017-11-15 12:28:39 -05:00
|
|
|
// New creates a new Freedom handler.
|
2017-01-12 18:56:21 -05:00
|
|
|
func New(ctx context.Context, config *Config) (*Handler, error) {
|
2018-02-21 11:05:29 -05:00
|
|
|
v := core.MustFromContext(ctx)
|
2016-12-22 07:33:28 -05:00
|
|
|
f := &Handler{
|
2018-01-10 06:22:37 -05:00
|
|
|
config: *config,
|
|
|
|
policyManager: v.PolicyManager(),
|
|
|
|
dns: v.DNSClient(),
|
2016-05-22 16:30:21 -04:00
|
|
|
}
|
2018-01-10 06:22:37 -05:00
|
|
|
|
2017-01-12 18:56:21 -05:00
|
|
|
return f, nil
|
2016-05-22 16:30:21 -04:00
|
|
|
}
|
|
|
|
|
2018-01-10 06:22:37 -05:00
|
|
|
func (h *Handler) policy() core.Policy {
|
|
|
|
p := h.policyManager.ForLevel(h.config.UserLevel)
|
|
|
|
if h.config.Timeout > 0 && h.config.UserLevel == 0 {
|
|
|
|
p.Timeouts.ConnectionIdle = time.Duration(h.config.Timeout) * time.Second
|
|
|
|
}
|
|
|
|
return p
|
|
|
|
}
|
|
|
|
|
2017-11-15 12:28:39 -05:00
|
|
|
func (h *Handler) resolveIP(ctx context.Context, domain string) net.Address {
|
2017-11-15 06:55:54 -05:00
|
|
|
if resolver, ok := proxy.ResolvedIPsFromContext(ctx); ok {
|
|
|
|
ips := resolver.Resolve()
|
|
|
|
if len(ips) == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return ips[dice.Roll(len(ips))]
|
2016-05-22 16:30:21 -04:00
|
|
|
}
|
|
|
|
|
2018-01-10 06:22:37 -05:00
|
|
|
ips, err := h.dns.LookupIP(domain)
|
2017-12-19 17:55:09 -05:00
|
|
|
if err != nil {
|
2018-06-24 19:09:02 -04:00
|
|
|
newError("failed to get IP address for domain ", domain).Base(err).WriteToLog(session.ExportIDToError(ctx))
|
2017-12-19 17:55:09 -05:00
|
|
|
}
|
2016-05-22 16:30:21 -04:00
|
|
|
if len(ips) == 0 {
|
2017-11-15 06:55:54 -05:00
|
|
|
return nil
|
2016-05-22 16:30:21 -04:00
|
|
|
}
|
2017-11-15 06:55:54 -05:00
|
|
|
return net.IPAddress(ips[dice.Roll(len(ips))])
|
2015-09-09 11:39:06 -04:00
|
|
|
}
|
|
|
|
|
2018-07-18 10:29:29 -04:00
|
|
|
func isValidAddress(addr *net.IPOrDomain) bool {
|
|
|
|
if addr == nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
a := addr.AsAddress()
|
|
|
|
return a != net.AnyIP
|
|
|
|
}
|
|
|
|
|
2017-11-15 12:28:39 -05:00
|
|
|
// Process implements proxy.Outbound.
|
2018-04-16 18:31:10 -04:00
|
|
|
func (h *Handler) Process(ctx context.Context, link *core.Link, dialer proxy.Dialer) error {
|
2017-02-09 16:49:38 -05:00
|
|
|
destination, _ := proxy.TargetFromContext(ctx)
|
2018-01-10 06:22:37 -05:00
|
|
|
if h.config.DestinationOverride != nil {
|
|
|
|
server := h.config.DestinationOverride.Server
|
2018-07-18 10:29:29 -04:00
|
|
|
if isValidAddress(server.Address) {
|
2018-07-18 10:21:40 -04:00
|
|
|
destination.Address = server.Address.AsAddress()
|
|
|
|
}
|
|
|
|
if server.Port != 0 {
|
|
|
|
destination.Port = net.Port(server.Port)
|
2017-01-26 17:05:24 -05:00
|
|
|
}
|
|
|
|
}
|
2018-06-24 19:09:02 -04:00
|
|
|
newError("opening connection to ", destination).WriteToLog(session.ExportIDToError(ctx))
|
2015-12-16 19:19:04 -05:00
|
|
|
|
2018-04-16 18:31:10 -04:00
|
|
|
input := link.Reader
|
|
|
|
output := link.Writer
|
2016-04-18 12:44:10 -04:00
|
|
|
|
2018-07-01 15:37:45 -04:00
|
|
|
var conn internet.Connection
|
|
|
|
err := retry.ExponentialBackoff(5, 100).On(func() error {
|
|
|
|
dialDest := destination
|
|
|
|
if h.config.DomainStrategy == Config_USE_IP && dialDest.Address.Family().IsDomain() {
|
|
|
|
ip := h.resolveIP(ctx, dialDest.Address.Domain())
|
|
|
|
if ip != nil {
|
|
|
|
dialDest = net.Destination{
|
|
|
|
Network: dialDest.Network,
|
|
|
|
Address: ip,
|
|
|
|
Port: dialDest.Port,
|
|
|
|
}
|
|
|
|
newError("dialing to to ", dialDest).WriteToLog(session.ExportIDToError(ctx))
|
2017-11-15 06:55:54 -05:00
|
|
|
}
|
|
|
|
}
|
2017-01-26 14:46:44 -05:00
|
|
|
|
2018-07-01 15:37:45 -04:00
|
|
|
rawConn, err := dialer.Dial(ctx, dialDest)
|
2015-12-16 19:19:04 -05:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
conn = rawConn
|
|
|
|
return nil
|
|
|
|
})
|
2015-09-09 11:39:25 -04:00
|
|
|
if err != nil {
|
2017-04-08 19:43:25 -04:00
|
|
|
return newError("failed to open connection to ", destination).Base(err)
|
2015-09-22 08:45:03 -04:00
|
|
|
}
|
2018-07-01 15:37:45 -04:00
|
|
|
defer conn.Close() // nolint: errcheck
|
2015-09-22 08:45:03 -04:00
|
|
|
|
2018-07-31 10:05:57 -04:00
|
|
|
plcy := h.policy()
|
2017-11-14 18:36:14 -05:00
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
2018-07-31 10:05:57 -04:00
|
|
|
timer := signal.CancelAfterInactivity(ctx, cancel, plcy.Timeouts.ConnectionIdle)
|
2017-01-31 06:42:05 -05:00
|
|
|
|
2018-04-11 10:45:09 -04:00
|
|
|
requestDone := func() error {
|
2018-07-31 10:05:57 -04:00
|
|
|
defer timer.SetTimeout(plcy.Timeouts.DownlinkOnly)
|
2018-02-19 15:38:04 -05:00
|
|
|
|
2017-04-16 03:57:28 -04:00
|
|
|
var writer buf.Writer
|
|
|
|
if destination.Network == net.Network_TCP {
|
|
|
|
writer = buf.NewWriter(conn)
|
|
|
|
} else {
|
2018-07-31 07:43:27 -04:00
|
|
|
writer = &buf.SequentialWriter{Writer: conn}
|
2017-04-16 03:57:28 -04:00
|
|
|
}
|
2017-04-27 16:30:48 -04:00
|
|
|
if err := buf.Copy(input, writer, buf.UpdateActivity(timer)); err != nil {
|
2017-04-16 16:48:51 -04:00
|
|
|
return newError("failed to process request").Base(err)
|
2016-11-21 18:17:49 -05:00
|
|
|
}
|
2018-02-19 15:38:04 -05:00
|
|
|
|
2016-12-29 18:32:20 -05:00
|
|
|
return nil
|
2018-04-11 10:45:09 -04:00
|
|
|
}
|
2015-09-22 12:31:06 -04:00
|
|
|
|
2018-04-11 10:45:09 -04:00
|
|
|
responseDone := func() error {
|
2018-07-31 10:05:57 -04:00
|
|
|
defer timer.SetTimeout(plcy.Timeouts.UplinkOnly)
|
2016-12-29 18:32:20 -05:00
|
|
|
|
2018-08-17 14:54:25 -04:00
|
|
|
if err := buf.Copy(buf.NewReader(conn), output, buf.UpdateActivity(timer)); err != nil {
|
2017-04-16 16:48:51 -04:00
|
|
|
return newError("failed to process response").Base(err)
|
2016-12-29 18:32:20 -05:00
|
|
|
}
|
2018-02-19 15:38:04 -05:00
|
|
|
|
2016-12-29 18:32:20 -05:00
|
|
|
return nil
|
2018-04-11 10:45:09 -04:00
|
|
|
}
|
2016-12-29 18:32:20 -05:00
|
|
|
|
2018-05-27 07:02:29 -04:00
|
|
|
if err := task.Run(task.WithContext(ctx), task.Parallel(requestDone, task.Single(responseDone, task.OnSuccess(task.Close(output)))))(); err != nil {
|
2017-04-08 19:43:25 -04:00
|
|
|
return newError("connection ends").Base(err)
|
2016-11-21 18:17:49 -05:00
|
|
|
}
|
2017-01-26 14:46:44 -05:00
|
|
|
|
|
|
|
return nil
|
2015-09-09 11:39:06 -04:00
|
|
|
}
|
2016-05-22 16:30:21 -04:00
|
|
|
|
|
|
|
func init() {
|
2017-01-12 18:56:21 -05:00
|
|
|
common.Must(common.RegisterConfig((*Config)(nil), func(ctx context.Context, config interface{}) (interface{}, error) {
|
|
|
|
return New(ctx, config.(*Config))
|
|
|
|
}))
|
2016-05-22 16:30:21 -04:00
|
|
|
}
|