1
0
mirror of https://github.com/v2fly/v2ray-core.git synced 2024-12-22 18:17:52 -05:00
v2fly/proxy/shadowsocks/client.go

186 lines
5.1 KiB
Go
Raw Normal View History

2016-10-31 10:24:28 -04:00
package shadowsocks
import (
"context"
2017-01-31 06:42:05 -05:00
"v2ray.com/core"
"v2ray.com/core/common"
2016-12-09 05:35:27 -05:00
"v2ray.com/core/common/buf"
2017-01-13 17:42:39 -05:00
"v2ray.com/core/common/net"
2016-10-31 10:24:28 -04:00
"v2ray.com/core/common/protocol"
"v2ray.com/core/common/retry"
2018-10-21 04:27:13 -04:00
"v2ray.com/core/common/session"
2016-12-29 18:32:20 -05:00
"v2ray.com/core/common/signal"
2018-10-21 04:27:13 -04:00
"v2ray.com/core/common/task"
"v2ray.com/core/features/policy"
2018-11-03 07:36:29 -04:00
"v2ray.com/core/transport"
2016-10-31 10:24:28 -04:00
"v2ray.com/core/transport/internet"
)
2016-12-21 17:07:35 -05:00
// Client is a inbound handler for Shadowsocks protocol
2016-10-31 10:24:28 -04:00
type Client struct {
2018-10-21 04:27:13 -04:00
serverPicker protocol.ServerPicker
policyManager policy.Manager
2016-10-31 10:24:28 -04:00
}
2016-12-21 17:07:35 -05:00
// NewClient create a new Shadowsocks client.
func NewClient(ctx context.Context, config *ClientConfig) (*Client, error) {
2016-11-02 11:33:04 -04:00
serverList := protocol.NewServerList()
for _, rec := range config.Server {
2018-08-26 18:11:32 -04:00
s, err := protocol.NewServerSpecFromPB(*rec)
if err != nil {
return nil, newError("failed to parse server spec").Base(err)
}
serverList.AddServer(s)
2016-11-02 11:33:04 -04:00
}
2017-04-11 07:42:10 -04:00
if serverList.Size() == 0 {
return nil, newError("0 server")
}
2018-10-21 04:27:13 -04:00
v := core.MustFromContext(ctx)
2016-11-02 11:33:04 -04:00
client := &Client{
2018-10-21 04:27:13 -04:00
serverPicker: protocol.NewRoundRobinServerPicker(serverList),
policyManager: v.GetFeature(policy.ManagerType()).(policy.Manager),
2016-11-02 11:33:04 -04:00
}
return client, nil
}
// Process implements OutboundHandler.Process().
2018-11-03 07:36:29 -04:00
func (c *Client) Process(ctx context.Context, link *transport.Link, dialer internet.Dialer) error {
outbound := session.OutboundFromContext(ctx)
if outbound == nil || !outbound.Target.IsValid() {
2017-04-08 18:54:23 -04:00
return newError("target not specified")
2017-02-09 16:49:38 -05:00
}
destination := outbound.Target
2016-10-31 10:24:28 -04:00
network := destination.Network
var server *protocol.ServerSpec
var conn internet.Connection
2016-11-20 15:47:51 -05:00
err := retry.ExponentialBackoff(5, 100).On(func() error {
2018-04-01 03:58:45 -04:00
server = c.serverPicker.PickServer()
2016-10-31 10:24:28 -04:00
dest := server.Destination()
dest.Network = network
rawConn, err := dialer.Dial(ctx, dest)
2016-10-31 10:24:28 -04:00
if err != nil {
return err
}
conn = rawConn
return nil
})
if err != nil {
2017-04-08 18:54:23 -04:00
return newError("failed to find an available destination").AtWarning().Base(err)
2016-10-31 10:24:28 -04:00
}
newError("tunneling request to ", destination, " via ", server.Destination()).WriteToLog(session.ExportIDToError(ctx))
2016-10-31 10:24:28 -04:00
defer conn.Close()
2016-11-02 17:18:25 -04:00
2016-10-31 11:35:18 -04:00
request := &protocol.RequestHeader{
Version: Version,
Address: destination.Address,
Port: destination.Port,
}
2017-01-13 17:42:39 -05:00
if destination.Network == net.Network_TCP {
2016-10-31 11:35:18 -04:00
request.Command = protocol.RequestCommandTCP
} else {
request.Command = protocol.RequestCommandUDP
}
user := server.PickUser()
2018-08-26 18:11:32 -04:00
account, ok := user.Account.(*MemoryAccount)
if !ok {
return newError("user account is not valid")
2016-10-31 11:35:18 -04:00
}
request.User = user
2016-11-02 11:17:57 -04:00
if account.OneTimeAuth == Account_Auto || account.OneTimeAuth == Account_Enabled {
2016-10-31 11:35:18 -04:00
request.Option |= RequestOptionOneTimeAuth
}
2018-10-21 04:27:13 -04:00
sessionPolicy := c.policyManager.ForLevel(user.Level)
2017-11-14 18:36:14 -05:00
ctx, cancel := context.WithCancel(ctx)
timer := signal.CancelAfterInactivity(ctx, cancel, sessionPolicy.Timeouts.ConnectionIdle)
2017-01-31 06:42:05 -05:00
2016-10-31 11:35:18 -04:00
if request.Command == protocol.RequestCommandTCP {
2017-11-09 16:33:15 -05:00
bufferedWriter := buf.NewBufferedWriter(buf.NewWriter(conn))
2016-10-31 11:35:18 -04:00
bodyWriter, err := WriteTCPRequest(request, bufferedWriter)
if err != nil {
2017-04-08 18:54:23 -04:00
return newError("failed to write request").Base(err)
2016-10-31 11:35:18 -04:00
}
2017-03-27 05:26:44 -04:00
if err := bufferedWriter.SetBuffered(false); err != nil {
return err
}
2016-12-29 18:32:20 -05:00
2018-04-11 10:45:09 -04:00
requestDone := func() error {
defer timer.SetTimeout(sessionPolicy.Timeouts.DownlinkOnly)
2018-04-16 18:31:10 -04:00
return buf.Copy(link.Reader, bodyWriter, buf.UpdateActivity(timer))
2018-04-11 10:45:09 -04:00
}
2016-10-31 11:35:18 -04:00
2018-04-11 10:45:09 -04:00
responseDone := func() error {
defer timer.SetTimeout(sessionPolicy.Timeouts.UplinkOnly)
2016-10-31 11:35:18 -04:00
responseReader, err := ReadTCPResponse(user, conn)
if err != nil {
2016-12-29 18:32:20 -05:00
return err
2016-10-31 11:35:18 -04:00
}
2018-04-16 18:31:10 -04:00
return buf.Copy(responseReader, link.Writer, buf.UpdateActivity(timer))
2018-04-11 10:45:09 -04:00
}
2016-11-04 20:00:09 -04:00
2018-05-27 08:42:53 -04:00
var responseDoneAndCloseWriter = task.Single(responseDone, task.OnSuccess(task.Close(link.Writer)))
if err := task.Run(task.WithContext(ctx), task.Parallel(requestDone, responseDoneAndCloseWriter))(); err != nil {
2017-04-08 18:54:23 -04:00
return newError("connection ends").Base(err)
2016-12-29 18:32:20 -05:00
}
return nil
2016-10-31 11:35:18 -04:00
}
if request.Command == protocol.RequestCommandUDP {
2018-07-31 07:43:27 -04:00
writer := &buf.SequentialWriter{Writer: &UDPWriter{
2016-11-04 20:00:09 -04:00
Writer: conn,
Request: request,
2018-07-31 07:43:27 -04:00
}}
2016-11-04 20:00:09 -04:00
2018-04-11 10:45:09 -04:00
requestDone := func() error {
defer timer.SetTimeout(sessionPolicy.Timeouts.DownlinkOnly)
2018-04-16 18:31:10 -04:00
if err := buf.Copy(link.Reader, writer, buf.UpdateActivity(timer)); err != nil {
2017-04-08 18:54:23 -04:00
return newError("failed to transport all UDP request").Base(err)
2016-12-29 18:32:20 -05:00
}
return nil
2018-04-11 10:45:09 -04:00
}
2016-12-29 18:32:20 -05:00
2018-04-11 10:45:09 -04:00
responseDone := func() error {
defer timer.SetTimeout(sessionPolicy.Timeouts.UplinkOnly)
2016-12-29 18:32:20 -05:00
reader := &UDPReader{
2017-01-31 06:42:05 -05:00
Reader: conn,
2016-12-29 18:32:20 -05:00
User: user,
}
2018-04-16 18:31:10 -04:00
if err := buf.Copy(reader, link.Writer, buf.UpdateActivity(timer)); err != nil {
2017-04-08 18:54:23 -04:00
return newError("failed to transport all UDP response").Base(err)
2016-12-29 18:32:20 -05:00
}
return nil
2018-04-11 10:45:09 -04:00
}
2016-12-29 18:32:20 -05:00
2018-05-27 07:02:29 -04:00
var responseDoneAndCloseWriter = task.Single(responseDone, task.OnSuccess(task.Close(link.Writer)))
if err := task.Run(task.WithContext(ctx), task.Parallel(requestDone, responseDoneAndCloseWriter))(); err != nil {
2017-04-08 18:54:23 -04:00
return newError("connection ends").Base(err)
2017-01-10 08:22:42 -05:00
}
return nil
2016-10-31 11:35:18 -04:00
}
return nil
2016-10-31 10:24:28 -04:00
}
2016-11-02 11:33:04 -04:00
func init() {
common.Must(common.RegisterConfig((*ClientConfig)(nil), func(ctx context.Context, config interface{}) (interface{}, error) {
return NewClient(ctx, config.(*ClientConfig))
}))
2016-11-02 11:33:04 -04:00
}