1
0
mirror of https://github.com/v2fly/v2ray-core.git synced 2024-11-18 10:26:01 -05:00
v2fly/proxy/mtproto/server.go

163 lines
4.2 KiB
Go
Raw Normal View History

2019-02-01 14:08:21 -05:00
// +build !confonly
2018-07-04 11:48:48 -04:00
package mtproto
import (
2019-01-06 18:12:04 -05:00
"bytes"
2018-07-04 11:48:48 -04:00
"context"
2018-07-04 12:58:19 -04:00
"time"
2018-07-04 11:48:48 -04:00
"v2ray.com/core"
"v2ray.com/core/common"
"v2ray.com/core/common/buf"
"v2ray.com/core/common/crypto"
"v2ray.com/core/common/net"
"v2ray.com/core/common/protocol"
2018-07-04 12:58:19 -04:00
"v2ray.com/core/common/session"
"v2ray.com/core/common/signal"
2018-07-04 11:48:48 -04:00
"v2ray.com/core/common/task"
2018-10-11 16:34:31 -04:00
"v2ray.com/core/features/policy"
"v2ray.com/core/features/routing"
2018-07-04 11:48:48 -04:00
"v2ray.com/core/transport/internet"
)
var (
dcList = []net.Address{
net.ParseAddress("149.154.175.50"),
net.ParseAddress("149.154.167.51"),
net.ParseAddress("149.154.175.100"),
net.ParseAddress("149.154.167.91"),
net.ParseAddress("149.154.171.5"),
}
)
type Server struct {
user *protocol.User
account *Account
2018-10-11 16:34:31 -04:00
policy policy.Manager
2018-07-04 11:48:48 -04:00
}
func NewServer(ctx context.Context, config *ServerConfig) (*Server, error) {
if len(config.User) == 0 {
return nil, newError("no user configured.")
}
user := config.User[0]
rawAccount, err := config.User[0].GetTypedAccount()
if err != nil {
return nil, newError("invalid account").Base(err)
}
account, ok := rawAccount.(*Account)
if !ok {
return nil, newError("not a MTProto account")
}
2018-07-04 12:58:19 -04:00
v := core.MustFromContext(ctx)
2018-07-04 11:48:48 -04:00
return &Server{
user: user,
account: account,
2018-10-21 04:27:13 -04:00
policy: v.GetFeature(policy.ManagerType()).(policy.Manager),
2018-07-04 11:48:48 -04:00
}, nil
}
2018-11-20 10:58:26 -05:00
func (s *Server) Network() []net.Network {
return []net.Network{net.Network_TCP}
2018-07-04 11:48:48 -04:00
}
2019-01-06 18:12:04 -05:00
var ctype1 = []byte{0xef, 0xef, 0xef, 0xef}
var ctype2 = []byte{0xee, 0xee, 0xee, 0xee}
func isValidConnectionType(c [4]byte) bool {
2019-01-06 18:12:04 -05:00
if bytes.Equal(c[:], ctype1) {
return true
}
2019-01-06 18:12:04 -05:00
if bytes.Equal(c[:], ctype2) {
return true
}
return false
}
func (s *Server) Process(ctx context.Context, network net.Network, conn internet.Connection, dispatcher routing.Dispatcher) error {
2018-07-04 12:58:19 -04:00
sPolicy := s.policy.ForLevel(s.user.Level)
if err := conn.SetDeadline(time.Now().Add(sPolicy.Timeouts.Handshake)); err != nil {
newError("failed to set deadline").Base(err).WriteToLog(session.ExportIDToError(ctx))
}
2018-07-04 11:48:48 -04:00
auth, err := ReadAuthentication(conn)
if err != nil {
return newError("failed to read authentication header").Base(err)
}
2018-07-04 12:47:06 -04:00
defer putAuthenticationObject(auth)
2018-07-04 11:48:48 -04:00
2018-07-04 12:58:19 -04:00
if err := conn.SetDeadline(time.Time{}); err != nil {
newError("failed to clear deadline").Base(err).WriteToLog(session.ExportIDToError(ctx))
}
2018-07-04 11:48:48 -04:00
auth.ApplySecret(s.account.Secret)
decryptor := crypto.NewAesCTRStream(auth.DecodingKey[:], auth.DecodingNonce[:])
decryptor.XORKeyStream(auth.Header[:], auth.Header[:])
ct := auth.ConnectionType()
if !isValidConnectionType(ct) {
return newError("invalid connection type: ", ct)
2018-07-04 12:47:06 -04:00
}
2018-07-04 11:48:48 -04:00
dcID := auth.DataCenterID()
2018-07-05 08:47:46 -04:00
if dcID >= uint16(len(dcList)) {
return newError("invalid datacenter id: ", dcID)
}
2018-07-04 11:48:48 -04:00
dest := net.Destination{
Network: net.Network_TCP,
Address: dcList[dcID],
Port: net.Port(443),
}
2018-07-04 12:58:19 -04:00
ctx, cancel := context.WithCancel(ctx)
timer := signal.CancelAfterInactivity(ctx, cancel, sPolicy.Timeouts.ConnectionIdle)
2018-10-11 16:34:31 -04:00
ctx = policy.ContextWithBufferPolicy(ctx, sPolicy.Buffer)
2018-07-04 12:58:19 -04:00
sc := SessionContext{
ConnectionType: ct,
DataCenterID: dcID,
}
ctx = ContextWithSessionContext(ctx, sc)
2018-07-04 11:48:48 -04:00
link, err := dispatcher.Dispatch(ctx, dest)
if err != nil {
return newError("failed to dispatch request to: ", dest).Base(err)
}
request := func() error {
2018-07-04 12:58:19 -04:00
defer timer.SetTimeout(sPolicy.Timeouts.DownlinkOnly)
2018-07-04 11:48:48 -04:00
reader := buf.NewReader(crypto.NewCryptionReader(decryptor, conn))
2018-07-05 08:47:46 -04:00
return buf.Copy(reader, link.Writer, buf.UpdateActivity(timer))
2018-07-04 11:48:48 -04:00
}
response := func() error {
2018-07-04 12:58:19 -04:00
defer timer.SetTimeout(sPolicy.Timeouts.UplinkOnly)
2018-07-04 11:48:48 -04:00
encryptor := crypto.NewAesCTRStream(auth.EncodingKey[:], auth.EncodingNonce[:])
writer := buf.NewWriter(crypto.NewCryptionWriter(encryptor, conn))
2018-07-05 08:47:46 -04:00
return buf.Copy(link.Reader, writer, buf.UpdateActivity(timer))
2018-07-04 11:48:48 -04:00
}
2018-12-06 05:35:02 -05:00
var responseDoneAndCloseWriter = task.OnSuccess(response, task.Close(link.Writer))
if err := task.Run(ctx, request, responseDoneAndCloseWriter); err != nil {
2018-12-31 15:25:10 -05:00
common.Interrupt(link.Reader)
common.Interrupt(link.Writer)
2018-07-04 11:48:48 -04:00
return newError("connection ends").Base(err)
}
return nil
}
func init() {
common.Must(common.RegisterConfig((*ServerConfig)(nil), func(ctx context.Context, config interface{}) (interface{}, error) {
return NewServer(ctx, config.(*ServerConfig))
}))
}