2018-01-10 06:22:37 -05:00
|
|
|
package dispatcher
|
2016-05-18 02:05:52 -04:00
|
|
|
|
2022-01-02 10:16:23 -05:00
|
|
|
//go:generate go run github.com/v2fly/v2ray-core/v5/common/errors/errorgen
|
2017-04-08 19:43:25 -04:00
|
|
|
|
2016-05-18 02:05:52 -04:00
|
|
|
import (
|
2017-01-13 07:41:40 -05:00
|
|
|
"context"
|
2018-07-16 07:47:00 -04:00
|
|
|
"strings"
|
2018-07-21 06:11:49 -04:00
|
|
|
"sync"
|
2017-04-24 18:49:27 -04:00
|
|
|
"time"
|
2017-01-04 06:34:01 -05:00
|
|
|
|
2022-01-02 10:16:23 -05:00
|
|
|
core "github.com/v2fly/v2ray-core/v5"
|
|
|
|
"github.com/v2fly/v2ray-core/v5/common"
|
|
|
|
"github.com/v2fly/v2ray-core/v5/common/buf"
|
|
|
|
"github.com/v2fly/v2ray-core/v5/common/log"
|
|
|
|
"github.com/v2fly/v2ray-core/v5/common/net"
|
|
|
|
"github.com/v2fly/v2ray-core/v5/common/protocol"
|
|
|
|
"github.com/v2fly/v2ray-core/v5/common/session"
|
2022-12-10 04:07:59 -05:00
|
|
|
"github.com/v2fly/v2ray-core/v5/common/strmatcher"
|
2022-01-02 10:16:23 -05:00
|
|
|
"github.com/v2fly/v2ray-core/v5/features/outbound"
|
|
|
|
"github.com/v2fly/v2ray-core/v5/features/policy"
|
|
|
|
"github.com/v2fly/v2ray-core/v5/features/routing"
|
|
|
|
routing_session "github.com/v2fly/v2ray-core/v5/features/routing/session"
|
|
|
|
"github.com/v2fly/v2ray-core/v5/features/stats"
|
|
|
|
"github.com/v2fly/v2ray-core/v5/transport"
|
|
|
|
"github.com/v2fly/v2ray-core/v5/transport/pipe"
|
2016-05-18 02:05:52 -04:00
|
|
|
)
|
|
|
|
|
2021-05-19 17:28:52 -04:00
|
|
|
var errSniffingTimeout = newError("timeout on sniffing")
|
2017-04-24 18:49:27 -04:00
|
|
|
|
2018-04-16 18:31:10 -04:00
|
|
|
type cachedReader struct {
|
2018-07-21 06:11:49 -04:00
|
|
|
sync.Mutex
|
2018-04-16 18:31:10 -04:00
|
|
|
reader *pipe.Reader
|
|
|
|
cache buf.MultiBuffer
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *cachedReader) Cache(b *buf.Buffer) {
|
2018-06-27 06:21:22 -04:00
|
|
|
mb, _ := r.reader.ReadMultiBufferTimeout(time.Millisecond * 100)
|
2018-07-21 06:11:49 -04:00
|
|
|
r.Lock()
|
2018-04-16 18:31:10 -04:00
|
|
|
if !mb.IsEmpty() {
|
2018-11-17 16:45:07 -05:00
|
|
|
r.cache, _ = buf.MergeMulti(r.cache, mb)
|
2018-04-16 18:31:10 -04:00
|
|
|
}
|
2018-11-02 16:34:04 -04:00
|
|
|
b.Clear()
|
|
|
|
rawBytes := b.Extend(buf.Size)
|
|
|
|
n := r.cache.Copy(rawBytes)
|
|
|
|
b.Resize(0, int32(n))
|
2018-07-21 06:11:49 -04:00
|
|
|
r.Unlock()
|
2018-04-16 18:31:10 -04:00
|
|
|
}
|
|
|
|
|
2018-12-11 03:17:10 -05:00
|
|
|
func (r *cachedReader) readInternal() buf.MultiBuffer {
|
2018-07-21 06:11:49 -04:00
|
|
|
r.Lock()
|
|
|
|
defer r.Unlock()
|
|
|
|
|
2018-07-23 17:39:55 -04:00
|
|
|
if r.cache != nil && !r.cache.IsEmpty() {
|
2018-04-16 18:31:10 -04:00
|
|
|
mb := r.cache
|
|
|
|
r.cache = nil
|
2018-12-11 03:17:10 -05:00
|
|
|
return mb
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *cachedReader) ReadMultiBuffer() (buf.MultiBuffer, error) {
|
|
|
|
mb := r.readInternal()
|
|
|
|
if mb != nil {
|
2018-04-16 18:31:10 -04:00
|
|
|
return mb, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return r.reader.ReadMultiBuffer()
|
|
|
|
}
|
|
|
|
|
2018-06-27 06:21:22 -04:00
|
|
|
func (r *cachedReader) ReadMultiBufferTimeout(timeout time.Duration) (buf.MultiBuffer, error) {
|
2018-12-11 03:17:10 -05:00
|
|
|
mb := r.readInternal()
|
|
|
|
if mb != nil {
|
2018-06-27 06:21:22 -04:00
|
|
|
return mb, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return r.reader.ReadMultiBufferTimeout(timeout)
|
|
|
|
}
|
|
|
|
|
2018-12-31 15:25:10 -05:00
|
|
|
func (r *cachedReader) Interrupt() {
|
2018-07-21 06:11:49 -04:00
|
|
|
r.Lock()
|
2018-07-23 17:39:55 -04:00
|
|
|
if r.cache != nil {
|
2018-11-17 16:45:07 -05:00
|
|
|
r.cache = buf.ReleaseMulti(r.cache)
|
2018-07-23 17:39:55 -04:00
|
|
|
}
|
2018-07-21 06:11:49 -04:00
|
|
|
r.Unlock()
|
2018-12-31 15:25:10 -05:00
|
|
|
r.reader.Interrupt()
|
2018-04-16 18:31:10 -04:00
|
|
|
}
|
|
|
|
|
2017-04-25 04:48:06 -04:00
|
|
|
// DefaultDispatcher is a default implementation of Dispatcher.
|
2016-05-18 02:05:52 -04:00
|
|
|
type DefaultDispatcher struct {
|
2018-10-12 17:57:56 -04:00
|
|
|
ohm outbound.Manager
|
2018-10-11 14:43:37 -04:00
|
|
|
router routing.Router
|
2018-10-11 16:34:31 -04:00
|
|
|
policy policy.Manager
|
2018-10-15 03:03:40 -04:00
|
|
|
stats stats.Manager
|
2016-05-18 02:05:52 -04:00
|
|
|
}
|
|
|
|
|
2018-10-22 09:58:52 -04:00
|
|
|
func init() {
|
|
|
|
common.Must(common.RegisterConfig((*Config)(nil), func(ctx context.Context, config interface{}) (interface{}, error) {
|
|
|
|
d := new(DefaultDispatcher)
|
|
|
|
if err := core.RequireFeatures(ctx, func(om outbound.Manager, router routing.Router, pm policy.Manager, sm stats.Manager) error {
|
|
|
|
return d.Init(config.(*Config), om, router, pm, sm)
|
|
|
|
}); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return d, nil
|
|
|
|
}))
|
2017-01-13 07:41:40 -05:00
|
|
|
}
|
|
|
|
|
2018-10-22 05:26:22 -04:00
|
|
|
// Init initializes DefaultDispatcher.
|
2018-10-22 09:58:52 -04:00
|
|
|
func (d *DefaultDispatcher) Init(config *Config, om outbound.Manager, router routing.Router, pm policy.Manager, sm stats.Manager) error {
|
2018-10-22 05:26:22 -04:00
|
|
|
d.ohm = om
|
|
|
|
d.router = router
|
|
|
|
d.policy = pm
|
|
|
|
d.stats = sm
|
2018-10-22 09:58:52 -04:00
|
|
|
return nil
|
2018-10-22 05:26:22 -04:00
|
|
|
}
|
|
|
|
|
2018-10-15 02:51:24 -04:00
|
|
|
// Type implements common.HasType.
|
2018-10-12 17:57:56 -04:00
|
|
|
func (*DefaultDispatcher) Type() interface{} {
|
|
|
|
return routing.DispatcherType()
|
|
|
|
}
|
|
|
|
|
2018-04-03 05:11:54 -04:00
|
|
|
// Start implements common.Runnable.
|
2017-04-25 04:48:06 -04:00
|
|
|
func (*DefaultDispatcher) Start() error {
|
2017-02-01 15:35:40 -05:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-04-03 05:11:54 -04:00
|
|
|
// Close implements common.Closable.
|
2018-02-08 09:39:46 -05:00
|
|
|
func (*DefaultDispatcher) Close() error { return nil }
|
2017-02-01 15:35:40 -05:00
|
|
|
|
2018-11-03 07:36:29 -04:00
|
|
|
func (d *DefaultDispatcher) getLink(ctx context.Context) (*transport.Link, *transport.Link) {
|
2018-05-25 06:08:28 -04:00
|
|
|
opt := pipe.OptionsFromContext(ctx)
|
|
|
|
uplinkReader, uplinkWriter := pipe.New(opt...)
|
|
|
|
downlinkReader, downlinkWriter := pipe.New(opt...)
|
2018-03-30 17:48:45 -04:00
|
|
|
|
2018-11-03 07:36:29 -04:00
|
|
|
inboundLink := &transport.Link{
|
2018-04-16 18:31:10 -04:00
|
|
|
Reader: downlinkReader,
|
|
|
|
Writer: uplinkWriter,
|
|
|
|
}
|
|
|
|
|
2018-11-03 07:36:29 -04:00
|
|
|
outboundLink := &transport.Link{
|
2018-04-16 18:31:10 -04:00
|
|
|
Reader: uplinkReader,
|
|
|
|
Writer: downlinkWriter,
|
|
|
|
}
|
|
|
|
|
2018-10-15 02:36:50 -04:00
|
|
|
sessionInbound := session.InboundFromContext(ctx)
|
|
|
|
var user *protocol.MemoryUser
|
|
|
|
if sessionInbound != nil {
|
|
|
|
user = sessionInbound.User
|
|
|
|
}
|
|
|
|
|
2018-03-30 17:48:45 -04:00
|
|
|
if user != nil && len(user.Email) > 0 {
|
2018-03-31 14:30:49 -04:00
|
|
|
p := d.policy.ForLevel(user.Level)
|
|
|
|
if p.Stats.UserUplink {
|
|
|
|
name := "user>>>" + user.Email + ">>>traffic>>>uplink"
|
2018-10-15 03:03:40 -04:00
|
|
|
if c, _ := stats.GetOrRegisterCounter(d.stats, name); c != nil {
|
2018-11-03 08:05:23 -04:00
|
|
|
inboundLink.Writer = &SizeStatWriter{
|
2018-04-16 18:31:10 -04:00
|
|
|
Counter: c,
|
|
|
|
Writer: inboundLink.Writer,
|
|
|
|
}
|
2018-03-31 14:30:49 -04:00
|
|
|
}
|
2018-03-30 17:48:45 -04:00
|
|
|
}
|
2018-03-31 14:30:49 -04:00
|
|
|
if p.Stats.UserDownlink {
|
|
|
|
name := "user>>>" + user.Email + ">>>traffic>>>downlink"
|
2018-10-15 03:03:40 -04:00
|
|
|
if c, _ := stats.GetOrRegisterCounter(d.stats, name); c != nil {
|
2018-11-03 08:05:23 -04:00
|
|
|
outboundLink.Writer = &SizeStatWriter{
|
2018-04-16 18:31:10 -04:00
|
|
|
Counter: c,
|
|
|
|
Writer: outboundLink.Writer,
|
|
|
|
}
|
2018-03-31 14:30:49 -04:00
|
|
|
}
|
2018-03-30 17:48:45 -04:00
|
|
|
}
|
2018-03-31 14:30:49 -04:00
|
|
|
}
|
2018-03-30 17:48:45 -04:00
|
|
|
|
2018-04-16 18:31:10 -04:00
|
|
|
return inboundLink, outboundLink
|
2018-03-31 14:30:49 -04:00
|
|
|
}
|
|
|
|
|
2018-07-16 07:47:00 -04:00
|
|
|
func shouldOverride(result SniffResult, domainOverride []string) bool {
|
2021-11-02 07:36:55 -04:00
|
|
|
if result.Domain() == "" {
|
|
|
|
return false
|
|
|
|
}
|
2021-02-08 05:18:52 -05:00
|
|
|
protocolString := result.Protocol()
|
|
|
|
if resComp, ok := result.(SnifferResultComposite); ok {
|
|
|
|
protocolString = resComp.ProtocolForDomainResult()
|
|
|
|
}
|
2018-07-16 07:47:00 -04:00
|
|
|
for _, p := range domainOverride {
|
2022-11-28 20:54:15 -05:00
|
|
|
if strings.HasPrefix(protocolString, p) || strings.HasSuffix(protocolString, p) {
|
2018-07-16 07:47:00 -04:00
|
|
|
return true
|
|
|
|
}
|
2021-04-10 08:40:15 -04:00
|
|
|
if resultSubset, ok := result.(SnifferIsProtoSubsetOf); ok {
|
|
|
|
if resultSubset.IsProtoSubsetOf(p) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
2018-07-16 07:47:00 -04:00
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2018-10-11 14:43:37 -04:00
|
|
|
// Dispatch implements routing.Dispatcher.
|
2018-11-03 07:36:29 -04:00
|
|
|
func (d *DefaultDispatcher) Dispatch(ctx context.Context, destination net.Destination) (*transport.Link, error) {
|
2018-03-31 14:30:49 -04:00
|
|
|
if !destination.IsValid() {
|
|
|
|
panic("Dispatcher: Invalid destination.")
|
2018-03-30 17:48:45 -04:00
|
|
|
}
|
2018-09-18 17:09:54 -04:00
|
|
|
ob := &session.Outbound{
|
|
|
|
Target: destination,
|
|
|
|
}
|
|
|
|
ctx = session.ContextWithOutbound(ctx, ob)
|
2018-03-31 14:30:49 -04:00
|
|
|
|
2018-04-16 18:31:10 -04:00
|
|
|
inbound, outbound := d.getLink(ctx)
|
2019-02-22 18:27:21 -05:00
|
|
|
content := session.ContentFromContext(ctx)
|
|
|
|
if content == nil {
|
|
|
|
content = new(session.Content)
|
|
|
|
ctx = session.ContextWithContent(ctx, content)
|
|
|
|
}
|
|
|
|
sniffingRequest := content.SniffingRequest
|
2021-11-02 07:36:55 -04:00
|
|
|
if !sniffingRequest.Enabled {
|
2021-02-08 05:18:52 -05:00
|
|
|
go d.routedDispatch(ctx, outbound, destination)
|
2021-11-02 07:36:55 -04:00
|
|
|
} else {
|
2017-04-24 18:49:27 -04:00
|
|
|
go func() {
|
2018-04-16 18:31:10 -04:00
|
|
|
cReader := &cachedReader{
|
|
|
|
reader: outbound.Reader.(*pipe.Reader),
|
|
|
|
}
|
|
|
|
outbound.Reader = cReader
|
2021-11-02 07:36:55 -04:00
|
|
|
result, err := sniffer(ctx, cReader, sniffingRequest.MetadataOnly, destination.Network)
|
2017-04-25 18:43:59 -04:00
|
|
|
if err == nil {
|
2019-02-22 10:58:16 -05:00
|
|
|
content.Protocol = result.Protocol()
|
2018-07-16 07:47:00 -04:00
|
|
|
}
|
2019-02-22 18:27:21 -05:00
|
|
|
if err == nil && shouldOverride(result, sniffingRequest.OverrideDestinationForProtocol) {
|
2022-12-10 04:07:59 -05:00
|
|
|
if domain, err := strmatcher.ToDomain(result.Domain()); err == nil {
|
|
|
|
newError("sniffed domain: ", domain, " for ", destination).WriteToLog(session.ExportIDToError(ctx))
|
|
|
|
destination.Address = net.ParseAddress(domain)
|
|
|
|
ob.Target = destination
|
|
|
|
}
|
2017-04-24 18:49:27 -04:00
|
|
|
}
|
2021-06-19 06:27:23 -04:00
|
|
|
d.routedDispatch(ctx, outbound, destination)
|
2017-04-24 18:49:27 -04:00
|
|
|
}()
|
|
|
|
}
|
2021-11-02 07:36:55 -04:00
|
|
|
|
2018-04-16 18:31:10 -04:00
|
|
|
return inbound, nil
|
2017-04-24 18:49:27 -04:00
|
|
|
}
|
|
|
|
|
2021-11-02 07:36:55 -04:00
|
|
|
func sniffer(ctx context.Context, cReader *cachedReader, metadataOnly bool, network net.Network) (SniffResult, error) {
|
2017-04-25 04:48:06 -04:00
|
|
|
payload := buf.New()
|
|
|
|
defer payload.Release()
|
|
|
|
|
2021-02-08 05:18:52 -05:00
|
|
|
sniffer := NewSniffer(ctx)
|
2018-04-16 18:31:10 -04:00
|
|
|
|
2021-02-08 05:18:52 -05:00
|
|
|
metaresult, metadataErr := sniffer.SniffMetadata(ctx)
|
|
|
|
|
|
|
|
if metadataOnly {
|
|
|
|
return metaresult, metadataErr
|
|
|
|
}
|
|
|
|
|
|
|
|
contentResult, contentErr := func() (SniffResult, error) {
|
|
|
|
totalAttempt := 0
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
return nil, ctx.Err()
|
|
|
|
default:
|
|
|
|
totalAttempt++
|
|
|
|
if totalAttempt > 2 {
|
|
|
|
return nil, errSniffingTimeout
|
|
|
|
}
|
|
|
|
|
|
|
|
cReader.Cache(payload)
|
|
|
|
if !payload.IsEmpty() {
|
2021-11-02 07:36:55 -04:00
|
|
|
result, err := sniffer.Sniff(ctx, payload.Bytes(), network)
|
2021-02-08 05:18:52 -05:00
|
|
|
if err != common.ErrNoClue {
|
|
|
|
return result, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if payload.IsFull() {
|
|
|
|
return nil, errUnknownContent
|
2017-04-24 18:49:27 -04:00
|
|
|
}
|
2017-04-24 19:40:34 -04:00
|
|
|
}
|
2017-04-24 18:49:27 -04:00
|
|
|
}
|
2021-02-08 05:18:52 -05:00
|
|
|
}()
|
|
|
|
if contentErr != nil && metadataErr == nil {
|
|
|
|
return metaresult, nil
|
|
|
|
}
|
|
|
|
if contentErr == nil && metadataErr == nil {
|
|
|
|
return CompositeResult(metaresult, contentResult), nil
|
2017-04-24 18:49:27 -04:00
|
|
|
}
|
2021-02-08 05:18:52 -05:00
|
|
|
return contentResult, contentErr
|
2017-04-24 18:49:27 -04:00
|
|
|
}
|
2021-11-02 07:36:55 -04:00
|
|
|
|
2018-11-03 07:36:29 -04:00
|
|
|
func (d *DefaultDispatcher) routedDispatch(ctx context.Context, link *transport.Link, destination net.Destination) {
|
2019-01-12 03:44:59 -05:00
|
|
|
var handler outbound.Handler
|
2020-03-02 05:07:43 -05:00
|
|
|
|
2021-02-28 13:47:31 -05:00
|
|
|
if forcedOutboundTag := session.GetForcedOutboundTagFromContext(ctx); forcedOutboundTag != "" {
|
2021-03-06 09:33:20 -05:00
|
|
|
ctx = session.SetForcedOutboundTagToContext(ctx, "")
|
2021-02-28 13:47:31 -05:00
|
|
|
if h := d.ohm.GetHandler(forcedOutboundTag); h != nil {
|
|
|
|
newError("taking platform initialized detour [", forcedOutboundTag, "] for [", destination, "]").WriteToLog(session.ExportIDToError(ctx))
|
|
|
|
handler = h
|
|
|
|
} else {
|
|
|
|
newError("non existing tag for platform initialized detour: ", forcedOutboundTag).AtError().WriteToLog(session.ExportIDToError(ctx))
|
|
|
|
common.Close(link.Writer)
|
|
|
|
common.Interrupt(link.Reader)
|
|
|
|
return
|
|
|
|
}
|
2021-03-13 18:44:47 -05:00
|
|
|
} else if d.router != nil {
|
|
|
|
if route, err := d.router.PickRoute(routing_session.AsRoutingContext(ctx)); err == nil {
|
|
|
|
tag := route.GetOutboundTag()
|
|
|
|
if h := d.ohm.GetHandler(tag); h != nil {
|
|
|
|
newError("taking detour [", tag, "] for [", destination, "]").WriteToLog(session.ExportIDToError(ctx))
|
|
|
|
handler = h
|
2016-05-18 02:05:52 -04:00
|
|
|
} else {
|
2021-03-13 18:44:47 -05:00
|
|
|
newError("non existing tag: ", tag).AtWarning().WriteToLog(session.ExportIDToError(ctx))
|
2016-05-18 02:05:52 -04:00
|
|
|
}
|
2021-03-13 18:44:47 -05:00
|
|
|
} else {
|
2021-11-27 00:11:38 -05:00
|
|
|
newError("default route for ", destination).AtWarning().WriteToLog(session.ExportIDToError(ctx))
|
2016-05-18 02:05:52 -04:00
|
|
|
}
|
|
|
|
}
|
2018-12-31 04:43:08 -05:00
|
|
|
|
2019-01-12 03:44:59 -05:00
|
|
|
if handler == nil {
|
|
|
|
handler = d.ohm.GetDefaultHandler()
|
|
|
|
}
|
|
|
|
|
|
|
|
if handler == nil {
|
2018-12-31 04:43:08 -05:00
|
|
|
newError("default outbound handler not exist").WriteToLog(session.ExportIDToError(ctx))
|
|
|
|
common.Close(link.Writer)
|
2018-12-31 15:25:10 -05:00
|
|
|
common.Interrupt(link.Reader)
|
2018-12-31 04:43:08 -05:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-03-02 21:00:52 -05:00
|
|
|
if accessMessage := log.AccessMessageFromContext(ctx); accessMessage != nil {
|
|
|
|
if tag := handler.Tag(); tag != "" {
|
|
|
|
accessMessage.Detour = tag
|
2023-02-08 11:54:55 -05:00
|
|
|
if d.policy.ForSystem().OverrideAccessLogDest {
|
|
|
|
accessMessage.To = destination
|
|
|
|
}
|
2019-10-27 11:13:00 -04:00
|
|
|
}
|
2019-06-12 01:04:34 -04:00
|
|
|
log.Record(accessMessage)
|
|
|
|
}
|
2021-01-30 07:32:34 -05:00
|
|
|
|
|
|
|
handler.Dispatch(ctx, link)
|
2016-05-18 02:05:52 -04:00
|
|
|
}
|