mirror of
https://github.com/XTLS/Xray-core.git
synced 2024-11-19 21:43:03 +00:00
167 lines
4.5 KiB
Go
167 lines
4.5 KiB
Go
|
package shadowsocks_2022
|
||
|
|
||
|
import (
|
||
|
"context"
|
||
|
"encoding/base64"
|
||
|
"io"
|
||
|
"runtime"
|
||
|
"strings"
|
||
|
"time"
|
||
|
|
||
|
C "github.com/sagernet/sing/common"
|
||
|
B "github.com/sagernet/sing/common/buf"
|
||
|
"github.com/sagernet/sing/common/bufio"
|
||
|
N "github.com/sagernet/sing/common/network"
|
||
|
"github.com/sagernet/sing/common/random"
|
||
|
"github.com/sagernet/sing/protocol/shadowsocks"
|
||
|
"github.com/sagernet/sing/protocol/shadowsocks/shadowaead_2022"
|
||
|
"github.com/xtls/xray-core/common"
|
||
|
"github.com/xtls/xray-core/common/buf"
|
||
|
"github.com/xtls/xray-core/common/net"
|
||
|
"github.com/xtls/xray-core/common/session"
|
||
|
"github.com/xtls/xray-core/transport"
|
||
|
"github.com/xtls/xray-core/transport/internet"
|
||
|
)
|
||
|
|
||
|
func init() {
|
||
|
common.Must(common.RegisterConfig((*ClientConfig)(nil), func(ctx context.Context, config interface{}) (interface{}, error) {
|
||
|
return NewClient(ctx, config.(*ClientConfig))
|
||
|
}))
|
||
|
}
|
||
|
|
||
|
type Outbound struct {
|
||
|
ctx context.Context
|
||
|
server net.Destination
|
||
|
method shadowsocks.Method
|
||
|
}
|
||
|
|
||
|
func NewClient(ctx context.Context, config *ClientConfig) (*Outbound, error) {
|
||
|
o := &Outbound{
|
||
|
ctx: ctx,
|
||
|
server: net.Destination{
|
||
|
Address: config.Address.AsAddress(),
|
||
|
Port: net.Port(config.Port),
|
||
|
Network: net.Network_TCP,
|
||
|
},
|
||
|
}
|
||
|
if C.Contains(shadowaead_2022.List, config.Method) {
|
||
|
if config.Key == "" {
|
||
|
return nil, newError("missing psk")
|
||
|
}
|
||
|
var pskList [][]byte
|
||
|
for _, ks := range strings.Split(config.Key, ":") {
|
||
|
psk, err := base64.StdEncoding.DecodeString(ks)
|
||
|
if err != nil {
|
||
|
return nil, newError("decode key ", ks).Base(err)
|
||
|
}
|
||
|
pskList = append(pskList, psk)
|
||
|
}
|
||
|
var rng io.Reader = random.Default
|
||
|
if config.ReducedIvHeadEntropy {
|
||
|
rng = &shadowsocks.ReducedEntropyReader{
|
||
|
Reader: rng,
|
||
|
}
|
||
|
}
|
||
|
method, err := shadowaead_2022.New(config.Method, pskList, "", rng)
|
||
|
if err != nil {
|
||
|
return nil, newError("create method").Base(err)
|
||
|
}
|
||
|
o.method = method
|
||
|
} else {
|
||
|
return nil, newError("unknown method ", config.Method)
|
||
|
}
|
||
|
return o, nil
|
||
|
}
|
||
|
|
||
|
func (o *Outbound) Process(ctx context.Context, link *transport.Link, dialer internet.Dialer) error {
|
||
|
var inboundConn net.Conn
|
||
|
inbound := session.InboundFromContext(ctx)
|
||
|
if inbound != nil {
|
||
|
inboundConn = inbound.Conn
|
||
|
}
|
||
|
|
||
|
outbound := session.OutboundFromContext(ctx)
|
||
|
if outbound == nil || !outbound.Target.IsValid() {
|
||
|
return newError("target not specified")
|
||
|
}
|
||
|
/*if statConn, ok := inboundConn.(*internet.StatCounterConn); ok {
|
||
|
inboundConn = statConn.Connection
|
||
|
}*/
|
||
|
destination := outbound.Target
|
||
|
network := destination.Network
|
||
|
|
||
|
newError("tunneling request to ", destination, " via ", o.server.NetAddr()).WriteToLog(session.ExportIDToError(ctx))
|
||
|
|
||
|
serverDestination := o.server
|
||
|
serverDestination.Network = network
|
||
|
connection, err := dialer.Dial(ctx, serverDestination)
|
||
|
if err != nil {
|
||
|
return newError("failed to connect to server").Base(err)
|
||
|
}
|
||
|
|
||
|
if network == net.Network_TCP {
|
||
|
serverConn := o.method.DialEarlyConn(connection, toSocksaddr(destination))
|
||
|
var handshake bool
|
||
|
if timeoutReader, isTimeoutReader := link.Reader.(buf.TimeoutReader); isTimeoutReader {
|
||
|
mb, err := timeoutReader.ReadMultiBufferTimeout(time.Millisecond * 100)
|
||
|
if err != nil && err != buf.ErrNotTimeoutReader && err != buf.ErrReadTimeout {
|
||
|
return newError("read payload").Base(err)
|
||
|
}
|
||
|
_payload := B.StackNew()
|
||
|
payload := C.Dup(_payload)
|
||
|
for {
|
||
|
payload.FullReset()
|
||
|
nb, n := buf.SplitBytes(mb, payload.FreeBytes())
|
||
|
if n > 0 {
|
||
|
payload.Truncate(n)
|
||
|
_, err = serverConn.Write(payload.Bytes())
|
||
|
if err != nil {
|
||
|
return newError("write payload").Base(err)
|
||
|
}
|
||
|
handshake = true
|
||
|
}
|
||
|
if nb.IsEmpty() {
|
||
|
break
|
||
|
} else {
|
||
|
mb = nb
|
||
|
}
|
||
|
}
|
||
|
runtime.KeepAlive(_payload)
|
||
|
}
|
||
|
if !handshake {
|
||
|
_, err = serverConn.Write(nil)
|
||
|
if err != nil {
|
||
|
return newError("client handshake").Base(err)
|
||
|
}
|
||
|
}
|
||
|
conn := &pipeConnWrapper{
|
||
|
W: link.Writer,
|
||
|
Conn: inboundConn,
|
||
|
}
|
||
|
if ir, ok := link.Reader.(io.Reader); ok {
|
||
|
conn.R = ir
|
||
|
} else {
|
||
|
conn.R = &buf.BufferedReader{Reader: link.Reader}
|
||
|
}
|
||
|
|
||
|
return bufio.CopyConn(ctx, conn, serverConn)
|
||
|
} else {
|
||
|
var packetConn N.PacketConn
|
||
|
if pc, isPacketConn := inboundConn.(N.PacketConn); isPacketConn {
|
||
|
packetConn = pc
|
||
|
} else if nc, isNetPacket := inboundConn.(net.PacketConn); isNetPacket {
|
||
|
packetConn = &bufio.PacketConnWrapper{PacketConn: nc}
|
||
|
} else {
|
||
|
packetConn = &packetConnWrapper{
|
||
|
Reader: link.Reader,
|
||
|
Writer: link.Writer,
|
||
|
Conn: inboundConn,
|
||
|
Dest: destination,
|
||
|
}
|
||
|
}
|
||
|
|
||
|
serverConn := o.method.DialPacketConn(connection)
|
||
|
return bufio.CopyPacketConn(ctx, packetConn, serverConn)
|
||
|
}
|
||
|
}
|