mirror of
https://github.com/v2fly/v2ray-core.git
synced 2024-12-21 09:36:34 -05:00
format code
This commit is contained in:
parent
4c963a51ed
commit
54fe1ed8b1
16
id.go
16
id.go
@ -26,8 +26,8 @@ func NewID(id string) (ID, error) {
|
||||
if err != nil {
|
||||
return ID{}, log.Error("Failed to parse id %s", id)
|
||||
}
|
||||
|
||||
md5hash := md5.New()
|
||||
|
||||
md5hash := md5.New()
|
||||
md5hash.Write(idBytes)
|
||||
md5hash.Write([]byte("c48619fe-8f02-49e0-b9e9-edf763e17e21"))
|
||||
cmdKey := md5.Sum(nil)
|
||||
@ -58,7 +58,7 @@ func (v ID) TimeHash(timeSec int64) []byte {
|
||||
}
|
||||
|
||||
func (v ID) Hash(data []byte) []byte {
|
||||
hasher := hmac.New(md5.New, v.Bytes)
|
||||
hasher := hmac.New(md5.New, v.Bytes)
|
||||
hasher.Write(data)
|
||||
return hasher.Sum(nil)
|
||||
}
|
||||
@ -68,8 +68,8 @@ func (v ID) CmdKey() []byte {
|
||||
}
|
||||
|
||||
func TimestampHash(timeSec int64) []byte {
|
||||
md5hash := md5.New()
|
||||
buffer := []byte{
|
||||
md5hash := md5.New()
|
||||
buffer := []byte{
|
||||
byte(timeSec >> 56),
|
||||
byte(timeSec >> 48),
|
||||
byte(timeSec >> 40),
|
||||
@ -80,9 +80,9 @@ func TimestampHash(timeSec int64) []byte {
|
||||
byte(timeSec),
|
||||
}
|
||||
md5hash.Write(buffer)
|
||||
md5hash.Write(buffer)
|
||||
md5hash.Write(buffer)
|
||||
md5hash.Write(buffer)
|
||||
md5hash.Write(buffer)
|
||||
md5hash.Write(buffer)
|
||||
md5hash.Write(buffer)
|
||||
return md5hash.Sum(nil)
|
||||
}
|
||||
|
||||
|
@ -57,7 +57,7 @@ func ReadAuthentication(reader io.Reader) (auth Socks5AuthenticationRequest, err
|
||||
return
|
||||
}
|
||||
|
||||
if nBytes - 2 != int(auth.nMethods) {
|
||||
if nBytes-2 != int(auth.nMethods) {
|
||||
err = fmt.Errorf("Unmatching number of auth methods, expecting %d, but got %d", auth.nMethods, nBytes)
|
||||
return
|
||||
}
|
||||
@ -78,7 +78,7 @@ func NewAuthenticationResponse(authMethod byte) *Socks5AuthenticationResponse {
|
||||
}
|
||||
|
||||
func (r *Socks5AuthenticationResponse) ToBytes() []byte {
|
||||
return []byte{r.version, r.authMethod}
|
||||
return []byte{r.version, r.authMethod}
|
||||
}
|
||||
|
||||
func WriteAuthentication(writer io.Writer, response *Socks5AuthenticationResponse) error {
|
||||
@ -87,54 +87,54 @@ func WriteAuthentication(writer io.Writer, response *Socks5AuthenticationRespons
|
||||
}
|
||||
|
||||
type Socks5UserPassRequest struct {
|
||||
version byte
|
||||
username string
|
||||
password string
|
||||
version byte
|
||||
username string
|
||||
password string
|
||||
}
|
||||
|
||||
func (request Socks5UserPassRequest) IsValid(username string, password string) bool {
|
||||
return request.username == username && request.password == password
|
||||
return request.username == username && request.password == password
|
||||
}
|
||||
|
||||
func ReadUserPassRequest(reader io.Reader) (request Socks5UserPassRequest, err error) {
|
||||
buffer := make([]byte, 256)
|
||||
_, err = reader.Read(buffer[0:2])
|
||||
if err != nil {
|
||||
return
|
||||
}
|
||||
request.version = buffer[0]
|
||||
nUsername := buffer[1]
|
||||
nBytes, err := reader.Read(buffer[:nUsername])
|
||||
if err != nil {
|
||||
return
|
||||
}
|
||||
request.username = string(buffer[:nBytes])
|
||||
|
||||
_, err = reader.Read(buffer[0:1])
|
||||
if err != nil {
|
||||
return
|
||||
}
|
||||
nPassword := buffer[0]
|
||||
nBytes, err = reader.Read(buffer[:nPassword])
|
||||
if err != nil {
|
||||
return
|
||||
}
|
||||
request.password = string(buffer[:nBytes])
|
||||
return
|
||||
buffer := make([]byte, 256)
|
||||
_, err = reader.Read(buffer[0:2])
|
||||
if err != nil {
|
||||
return
|
||||
}
|
||||
request.version = buffer[0]
|
||||
nUsername := buffer[1]
|
||||
nBytes, err := reader.Read(buffer[:nUsername])
|
||||
if err != nil {
|
||||
return
|
||||
}
|
||||
request.username = string(buffer[:nBytes])
|
||||
|
||||
_, err = reader.Read(buffer[0:1])
|
||||
if err != nil {
|
||||
return
|
||||
}
|
||||
nPassword := buffer[0]
|
||||
nBytes, err = reader.Read(buffer[:nPassword])
|
||||
if err != nil {
|
||||
return
|
||||
}
|
||||
request.password = string(buffer[:nBytes])
|
||||
return
|
||||
}
|
||||
|
||||
type Socks5UserPassResponse struct {
|
||||
version byte
|
||||
status byte
|
||||
version byte
|
||||
status byte
|
||||
}
|
||||
|
||||
func NewSocks5UserPassResponse(status byte) Socks5UserPassResponse {
|
||||
return Socks5UserPassResponse{socksVersion, status}
|
||||
return Socks5UserPassResponse{socksVersion, status}
|
||||
}
|
||||
|
||||
func WriteUserPassResponse(writer io.Writer, response Socks5UserPassResponse) error {
|
||||
_, err := writer.Write([]byte{response.version, response.status})
|
||||
return err
|
||||
_, err := writer.Write([]byte{response.version, response.status})
|
||||
return err
|
||||
}
|
||||
|
||||
const (
|
||||
|
@ -65,8 +65,8 @@ func (r *VMessRequestReader) Read(reader io.Reader) (*VMessRequest, error) {
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
log.Debug("Read user hash: %v", buffer[:nBytes])
|
||||
|
||||
log.Debug("Read user hash: %v", buffer[:nBytes])
|
||||
|
||||
userId, timeSec, valid := r.vUserSet.GetUser(buffer[:nBytes])
|
||||
if !valid {
|
||||
@ -187,9 +187,9 @@ func NewVMessRequestWriter() *VMessRequestWriter {
|
||||
|
||||
func (w *VMessRequestWriter) Write(writer io.Writer, request *VMessRequest) error {
|
||||
buffer := make([]byte, 0, 300)
|
||||
userHash, timeSec := request.UserId.TimeRangeHash(30)
|
||||
|
||||
log.Debug("Writing userhash: %v", userHash)
|
||||
userHash, timeSec := request.UserId.TimeRangeHash(30)
|
||||
|
||||
log.Debug("Writing userhash: %v", userHash)
|
||||
buffer = append(buffer, userHash...)
|
||||
|
||||
encryptionBegin := len(buffer)
|
||||
|
@ -13,7 +13,7 @@ import (
|
||||
)
|
||||
|
||||
func TestVMessSerialization(t *testing.T) {
|
||||
t.Skip();
|
||||
t.Skip()
|
||||
assert := unit.Assert(t)
|
||||
|
||||
userId, err := core.NewID("2b2966ac-16aa-4fbf-8d81-c5f172a3da51")
|
||||
|
@ -1,9 +1,9 @@
|
||||
package socks
|
||||
|
||||
import (
|
||||
"bufio"
|
||||
"bufio"
|
||||
"errors"
|
||||
"io"
|
||||
"io"
|
||||
"net"
|
||||
"strconv"
|
||||
|
||||
@ -16,7 +16,7 @@ import (
|
||||
var (
|
||||
ErrorAuthenticationFailed = errors.New("None of the authentication methods is allowed.")
|
||||
ErrorCommandNotSupported = errors.New("Client requested an unsupported command.")
|
||||
ErrorInvalidUser = errors.New("Invalid username or password.")
|
||||
ErrorInvalidUser = errors.New("Invalid username or password.")
|
||||
)
|
||||
|
||||
// SocksServer is a SOCKS 5 proxy server
|
||||
@ -63,8 +63,8 @@ func (server *SocksServer) AcceptConnections(listener net.Listener) error {
|
||||
|
||||
func (server *SocksServer) HandleConnection(connection net.Conn) error {
|
||||
defer connection.Close()
|
||||
|
||||
reader := bufio.NewReader(connection)
|
||||
|
||||
reader := bufio.NewReader(connection)
|
||||
|
||||
auth, err := socksio.ReadAuthentication(reader)
|
||||
if err != nil {
|
||||
@ -87,23 +87,23 @@ func (server *SocksServer) HandleConnection(connection net.Conn) error {
|
||||
|
||||
authResponse := socksio.NewAuthenticationResponse(expectedAuthMethod)
|
||||
socksio.WriteAuthentication(connection, authResponse)
|
||||
|
||||
if server.config.AuthMethod == JsonAuthMethodUserPass {
|
||||
upRequest, err := socksio.ReadUserPassRequest(reader)
|
||||
if err != nil {
|
||||
log.Error("Failed to read username and password: %v", err)
|
||||
return err
|
||||
}
|
||||
status := byte(0)
|
||||
if ! upRequest.IsValid(server.config.Username, server.config.Password) {
|
||||
status = byte(0xFF)
|
||||
}
|
||||
upResponse := socksio.NewSocks5UserPassResponse(status)
|
||||
socksio.WriteUserPassResponse(connection, upResponse)
|
||||
if status != byte(0) {
|
||||
return ErrorInvalidUser
|
||||
}
|
||||
}
|
||||
|
||||
if server.config.AuthMethod == JsonAuthMethodUserPass {
|
||||
upRequest, err := socksio.ReadUserPassRequest(reader)
|
||||
if err != nil {
|
||||
log.Error("Failed to read username and password: %v", err)
|
||||
return err
|
||||
}
|
||||
status := byte(0)
|
||||
if !upRequest.IsValid(server.config.Username, server.config.Password) {
|
||||
status = byte(0xFF)
|
||||
}
|
||||
upResponse := socksio.NewSocks5UserPassResponse(status)
|
||||
socksio.WriteUserPassResponse(connection, upResponse)
|
||||
if status != byte(0) {
|
||||
return ErrorInvalidUser
|
||||
}
|
||||
}
|
||||
|
||||
request, err := socksio.ReadRequest(reader)
|
||||
if err != nil {
|
||||
|
@ -2,7 +2,7 @@ package vmess
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"net"
|
||||
"net"
|
||||
|
||||
"github.com/v2ray/v2ray-core"
|
||||
"github.com/v2ray/v2ray-core/log"
|
||||
@ -44,10 +44,10 @@ func (config VNextConfig) ToVNextServer() VNextServer {
|
||||
}
|
||||
users = append(users, vuser)
|
||||
}
|
||||
ip := net.ParseIP(config.Address)
|
||||
if ip == nil {
|
||||
panic(log.Error("Unable to parse VNext IP: %s", config.Address))
|
||||
}
|
||||
ip := net.ParseIP(config.Address)
|
||||
if ip == nil {
|
||||
panic(log.Error("Unable to parse VNext IP: %s", config.Address))
|
||||
}
|
||||
return VNextServer{
|
||||
v2net.IPAddress(ip, config.Port),
|
||||
users}
|
||||
|
@ -55,7 +55,7 @@ func (handler *VMessInboundHandler) HandleConnection(connection net.Conn) error
|
||||
|
||||
request, err := reader.Read(connection)
|
||||
if err != nil {
|
||||
log.Debug("Failed to parse VMess request: %v", err)
|
||||
log.Debug("Failed to parse VMess request: %v", err)
|
||||
return err
|
||||
}
|
||||
log.Debug("Received request for %s", request.Address.String())
|
||||
|
@ -66,24 +66,24 @@ func (handler *VMessOutboundHandler) Start(ray core.OutboundRay) error {
|
||||
}
|
||||
|
||||
func startCommunicate(request *vmessio.VMessRequest, dest v2net.Address, ray core.OutboundRay) error {
|
||||
input := ray.OutboundInput()
|
||||
input := ray.OutboundInput()
|
||||
output := ray.OutboundOutput()
|
||||
|
||||
|
||||
conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{dest.IP, int(dest.Port), ""})
|
||||
log.Debug("VMessOutbound dialing tcp: %s", dest.String())
|
||||
if err != nil {
|
||||
log.Error("Failed to open tcp (%s): %v", dest.String(), err)
|
||||
close(output)
|
||||
close(output)
|
||||
return err
|
||||
}
|
||||
defer conn.Close()
|
||||
defer close(output)
|
||||
|
||||
requestFinish := make(chan bool)
|
||||
responseFinish := make(chan bool)
|
||||
|
||||
go handleRequest(conn, request, input, requestFinish)
|
||||
go handleResponse(conn, request, output, responseFinish)
|
||||
defer close(output)
|
||||
|
||||
requestFinish := make(chan bool)
|
||||
responseFinish := make(chan bool)
|
||||
|
||||
go handleRequest(conn, request, input, requestFinish)
|
||||
go handleResponse(conn, request, output, responseFinish)
|
||||
|
||||
<-requestFinish
|
||||
conn.CloseWrite()
|
||||
@ -92,27 +92,27 @@ func startCommunicate(request *vmessio.VMessRequest, dest v2net.Address, ray cor
|
||||
}
|
||||
|
||||
func handleRequest(conn *net.TCPConn, request *vmessio.VMessRequest, input <-chan []byte, finish chan<- bool) error {
|
||||
defer close(finish)
|
||||
requestWriter := vmessio.NewVMessRequestWriter()
|
||||
defer close(finish)
|
||||
requestWriter := vmessio.NewVMessRequestWriter()
|
||||
err := requestWriter.Write(conn, request)
|
||||
if err != nil {
|
||||
log.Error("Failed to write VMess request: %v", err)
|
||||
return err
|
||||
}
|
||||
|
||||
encryptRequestWriter, err := v2io.NewAesEncryptWriter(request.RequestKey[:], request.RequestIV[:], conn)
|
||||
|
||||
encryptRequestWriter, err := v2io.NewAesEncryptWriter(request.RequestKey[:], request.RequestIV[:], conn)
|
||||
if err != nil {
|
||||
log.Error("Failed to create encrypt writer: %v", err)
|
||||
return err
|
||||
}
|
||||
|
||||
v2net.ChanToWriter(encryptRequestWriter, input)
|
||||
return nil
|
||||
|
||||
v2net.ChanToWriter(encryptRequestWriter, input)
|
||||
return nil
|
||||
}
|
||||
|
||||
func handleResponse(conn *net.TCPConn, request *vmessio.VMessRequest, output chan<- []byte, finish chan<- bool) error {
|
||||
defer close(finish)
|
||||
responseKey := md5.Sum(request.RequestKey[:])
|
||||
defer close(finish)
|
||||
responseKey := md5.Sum(request.RequestKey[:])
|
||||
responseIV := md5.Sum(request.RequestIV[:])
|
||||
|
||||
response := vmessio.VMessResponse{}
|
||||
@ -129,9 +129,9 @@ func handleResponse(conn *net.TCPConn, request *vmessio.VMessRequest, output cha
|
||||
log.Error("Failed to create decrypt reader: %v", err)
|
||||
return err
|
||||
}
|
||||
|
||||
|
||||
v2net.ReaderToChan(output, decryptResponseReader)
|
||||
return nil
|
||||
return nil
|
||||
}
|
||||
|
||||
type VMessOutboundHandlerFactory struct {
|
||||
|
@ -16,22 +16,22 @@ import (
|
||||
|
||||
var (
|
||||
configFile = flag.String("config", "", "Config file for this Point server.")
|
||||
logLevel = flag.String("loglevel", "", "Level of log info to be printed to console, available value: debug, info, warning, error")
|
||||
logLevel = flag.String("loglevel", "", "Level of log info to be printed to console, available value: debug, info, warning, error")
|
||||
)
|
||||
|
||||
func main() {
|
||||
flag.Parse()
|
||||
|
||||
switch *logLevel {
|
||||
case "debug":
|
||||
log.SetLogLevel(log.DebugLevel)
|
||||
case "info":
|
||||
log.SetLogLevel(log.InfoLevel)
|
||||
case "warning":
|
||||
log.SetLogLevel(log.WarningLevel)
|
||||
case "error":
|
||||
log.SetLogLevel(log.ErrorLevel)
|
||||
}
|
||||
|
||||
switch *logLevel {
|
||||
case "debug":
|
||||
log.SetLogLevel(log.DebugLevel)
|
||||
case "info":
|
||||
log.SetLogLevel(log.InfoLevel)
|
||||
case "warning":
|
||||
log.SetLogLevel(log.WarningLevel)
|
||||
case "error":
|
||||
log.SetLogLevel(log.ErrorLevel)
|
||||
}
|
||||
|
||||
if configFile == nil || len(*configFile) == 0 {
|
||||
panic(log.Error("Config file is not set."))
|
||||
|
18
userset.go
18
userset.go
@ -20,8 +20,8 @@ type TimedUserSet struct {
|
||||
}
|
||||
|
||||
type indexTimePair struct {
|
||||
index int
|
||||
timeSec int64
|
||||
index int
|
||||
timeSec int64
|
||||
}
|
||||
|
||||
type hashEntry struct {
|
||||
@ -47,8 +47,8 @@ func (us *TimedUserSet) updateUserHash(tick <-chan time.Time) {
|
||||
for {
|
||||
now := <-tick
|
||||
nowSec := now.UTC().Unix()
|
||||
|
||||
remove2Sec := nowSec - cacheDurationSec
|
||||
|
||||
remove2Sec := nowSec - cacheDurationSec
|
||||
if remove2Sec > lastSec2Remove {
|
||||
for lastSec2Remove+1 < remove2Sec {
|
||||
entry := <-hash2Remove
|
||||
@ -56,15 +56,15 @@ func (us *TimedUserSet) updateUserHash(tick <-chan time.Time) {
|
||||
delete(us.userHashes, entry.hash)
|
||||
}
|
||||
}
|
||||
|
||||
for lastSec < nowSec + cacheDurationSec {
|
||||
for idx, id := range us.validUserIds {
|
||||
|
||||
for lastSec < nowSec+cacheDurationSec {
|
||||
for idx, id := range us.validUserIds {
|
||||
idHash := id.TimeHash(lastSec)
|
||||
hash2Remove <- hashEntry{string(idHash), lastSec}
|
||||
us.userHashes[string(idHash)] = indexTimePair{idx, lastSec}
|
||||
}
|
||||
lastSec ++
|
||||
}
|
||||
lastSec++
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user