mirror of
https://github.com/v2fly/v2ray-core.git
synced 2024-12-22 10:08:15 -05:00
snifered dispatch
This commit is contained in:
parent
77521029b1
commit
2c3ed5d9e4
@ -4,6 +4,7 @@ package impl
|
||||
|
||||
import (
|
||||
"context"
|
||||
"time"
|
||||
|
||||
"v2ray.com/core/app"
|
||||
"v2ray.com/core/app/dispatcher"
|
||||
@ -16,6 +17,10 @@ import (
|
||||
"v2ray.com/core/transport/ray"
|
||||
)
|
||||
|
||||
var (
|
||||
errSniffingTimeout = newError("timeout on sniffing")
|
||||
)
|
||||
|
||||
type DefaultDispatcher struct {
|
||||
ohm proxyman.OutboundHandlerManager
|
||||
router *router.Router
|
||||
@ -48,14 +53,85 @@ func (DefaultDispatcher) Interface() interface{} {
|
||||
return (*dispatcher.Interface)(nil)
|
||||
}
|
||||
|
||||
type domainOrError struct {
|
||||
domain string
|
||||
err error
|
||||
}
|
||||
|
||||
func (d *DefaultDispatcher) Dispatch(ctx context.Context, destination net.Destination) (ray.InboundRay, error) {
|
||||
dispatcher := d.ohm.GetDefaultHandler()
|
||||
if !destination.IsValid() {
|
||||
panic("Dispatcher: Invalid destination.")
|
||||
}
|
||||
|
||||
ctx = proxy.ContextWithTarget(ctx, destination)
|
||||
|
||||
outbound := ray.NewRay(ctx)
|
||||
sniferList := proxyman.ProtocoSniffersFromContext(ctx)
|
||||
if len(sniferList) == 0 {
|
||||
go d.routedDispatch(ctx, outbound, destination)
|
||||
} else {
|
||||
go func() {
|
||||
done := make(chan domainOrError)
|
||||
go snifer(ctx, sniferList, outbound, done)
|
||||
de := <-done
|
||||
if de.err != nil {
|
||||
log.Trace(newError("failed to snif").Base(de.err))
|
||||
}
|
||||
destination.Address = net.ParseAddress(de.domain)
|
||||
ctx = proxy.ContextWithTarget(ctx, destination)
|
||||
d.routedDispatch(ctx, outbound, destination)
|
||||
}()
|
||||
}
|
||||
return outbound, nil
|
||||
}
|
||||
|
||||
func snifer(ctx context.Context, sniferList []proxyman.KnownProtocols, outbound ray.OutboundRay, done chan<- domainOrError) {
|
||||
payload := make([]byte, 2048)
|
||||
totalAttempt := 0
|
||||
for {
|
||||
select {
|
||||
case <-ctx.Done():
|
||||
done <- domainOrError{
|
||||
domain: "",
|
||||
err: ctx.Err(),
|
||||
}
|
||||
return
|
||||
case <-time.After(time.Millisecond * 100):
|
||||
totalAttempt++
|
||||
if totalAttempt > 5 {
|
||||
done <- domainOrError{
|
||||
domain: "",
|
||||
err: errSniffingTimeout,
|
||||
}
|
||||
return
|
||||
}
|
||||
mb := outbound.OutboundInput().Peek()
|
||||
nBytes, _ := mb.Read(payload)
|
||||
for _, protocol := range sniferList {
|
||||
var f func([]byte) (string, error)
|
||||
switch protocol {
|
||||
case proxyman.KnownProtocols_HTTP:
|
||||
f = SniffHTTP
|
||||
case proxyman.KnownProtocols_TLS:
|
||||
f = SniffTLS
|
||||
default:
|
||||
panic("Unsupported protocol")
|
||||
}
|
||||
|
||||
domain, err := f(payload[:nBytes])
|
||||
if err != ErrMoreData {
|
||||
done <- domainOrError{
|
||||
domain: domain,
|
||||
err: err,
|
||||
}
|
||||
return
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func (d *DefaultDispatcher) routedDispatch(ctx context.Context, outbound ray.OutboundRay, destination net.Destination) {
|
||||
dispatcher := d.ohm.GetDefaultHandler()
|
||||
if d.router != nil {
|
||||
if tag, err := d.router.TakeDetour(ctx); err == nil {
|
||||
if handler := d.ohm.GetHandler(tag); handler != nil {
|
||||
@ -68,11 +144,7 @@ func (d *DefaultDispatcher) Dispatch(ctx context.Context, destination net.Destin
|
||||
log.Trace(newError("default route for ", destination))
|
||||
}
|
||||
}
|
||||
|
||||
direct := ray.NewRay(ctx)
|
||||
go dispatcher.Dispatch(ctx, direct)
|
||||
|
||||
return direct, nil
|
||||
dispatcher.Dispatch(ctx, outbound)
|
||||
}
|
||||
|
||||
func init() {
|
||||
|
@ -42,6 +42,7 @@ type InputStream interface {
|
||||
buf.Reader
|
||||
buf.TimeoutReader
|
||||
RayStream
|
||||
Peek() buf.MultiBuffer
|
||||
}
|
||||
|
||||
type OutputStream interface {
|
||||
|
Loading…
Reference in New Issue
Block a user