mirror of
https://github.com/XTLS/Xray-core.git
synced 2024-11-23 07:23:01 +00:00
017f53b5fc
* Add session context outbounds as slice slice is needed for dialer proxy where two outbounds work on top of each other There are two sets of target addr for example It also enable Xtls to correctly do splice copy by checking both outbounds are ready to do direct copy * Fill outbound tag info * Splice now checks capalibility from all outbounds * Fix unit tests
255 lines
7.0 KiB
Go
255 lines
7.0 KiB
Go
package shadowsocks_2022
|
|
|
|
import (
|
|
"context"
|
|
"encoding/base64"
|
|
"strconv"
|
|
"strings"
|
|
"sync"
|
|
|
|
"github.com/sagernet/sing-shadowsocks/shadowaead_2022"
|
|
C "github.com/sagernet/sing/common"
|
|
A "github.com/sagernet/sing/common/auth"
|
|
B "github.com/sagernet/sing/common/buf"
|
|
"github.com/sagernet/sing/common/bufio"
|
|
E "github.com/sagernet/sing/common/exceptions"
|
|
M "github.com/sagernet/sing/common/metadata"
|
|
N "github.com/sagernet/sing/common/network"
|
|
"github.com/xtls/xray-core/common"
|
|
"github.com/xtls/xray-core/common/buf"
|
|
"github.com/xtls/xray-core/common/log"
|
|
"github.com/xtls/xray-core/common/net"
|
|
"github.com/xtls/xray-core/common/protocol"
|
|
"github.com/xtls/xray-core/common/session"
|
|
"github.com/xtls/xray-core/common/singbridge"
|
|
"github.com/xtls/xray-core/common/uuid"
|
|
"github.com/xtls/xray-core/features/routing"
|
|
"github.com/xtls/xray-core/transport/internet/stat"
|
|
)
|
|
|
|
func init() {
|
|
common.Must(common.RegisterConfig((*MultiUserServerConfig)(nil), func(ctx context.Context, config interface{}) (interface{}, error) {
|
|
return NewMultiServer(ctx, config.(*MultiUserServerConfig))
|
|
}))
|
|
}
|
|
|
|
type MultiUserInbound struct {
|
|
sync.Mutex
|
|
networks []net.Network
|
|
users []*User
|
|
service *shadowaead_2022.MultiService[int]
|
|
}
|
|
|
|
func NewMultiServer(ctx context.Context, config *MultiUserServerConfig) (*MultiUserInbound, error) {
|
|
networks := config.Network
|
|
if len(networks) == 0 {
|
|
networks = []net.Network{
|
|
net.Network_TCP,
|
|
net.Network_UDP,
|
|
}
|
|
}
|
|
inbound := &MultiUserInbound{
|
|
networks: networks,
|
|
users: config.Users,
|
|
}
|
|
if config.Key == "" {
|
|
return nil, newError("missing key")
|
|
}
|
|
psk, err := base64.StdEncoding.DecodeString(config.Key)
|
|
if err != nil {
|
|
return nil, newError("parse config").Base(err)
|
|
}
|
|
service, err := shadowaead_2022.NewMultiService[int](config.Method, psk, 500, inbound, nil)
|
|
if err != nil {
|
|
return nil, newError("create service").Base(err)
|
|
}
|
|
|
|
for i, user := range config.Users {
|
|
if user.Email == "" {
|
|
u := uuid.New()
|
|
user.Email = "unnamed-user-" + strconv.Itoa(i) + "-" + u.String()
|
|
}
|
|
}
|
|
err = service.UpdateUsersWithPasswords(
|
|
C.MapIndexed(config.Users, func(index int, it *User) int { return index }),
|
|
C.Map(config.Users, func(it *User) string { return it.Key }),
|
|
)
|
|
if err != nil {
|
|
return nil, newError("create service").Base(err)
|
|
}
|
|
|
|
inbound.service = service
|
|
return inbound, nil
|
|
}
|
|
|
|
// AddUser implements proxy.UserManager.AddUser().
|
|
func (i *MultiUserInbound) AddUser(ctx context.Context, u *protocol.MemoryUser) error {
|
|
i.Lock()
|
|
defer i.Unlock()
|
|
|
|
account := u.Account.(*MemoryAccount)
|
|
if account.Email != "" {
|
|
for idx := range i.users {
|
|
if i.users[idx].Email == account.Email {
|
|
return newError("User ", account.Email, " already exists.")
|
|
}
|
|
}
|
|
}
|
|
i.users = append(i.users, &User{
|
|
Key: account.Key,
|
|
Email: account.Email,
|
|
Level: account.Level,
|
|
})
|
|
|
|
// sync to multi service
|
|
// Considering implements shadowsocks2022 in xray-core may have better performance.
|
|
i.service.UpdateUsersWithPasswords(
|
|
C.MapIndexed(i.users, func(index int, it *User) int { return index }),
|
|
C.Map(i.users, func(it *User) string { return it.Key }),
|
|
)
|
|
|
|
return nil
|
|
}
|
|
|
|
// RemoveUser implements proxy.UserManager.RemoveUser().
|
|
func (i *MultiUserInbound) RemoveUser(ctx context.Context, email string) error {
|
|
if email == "" {
|
|
return newError("Email must not be empty.")
|
|
}
|
|
|
|
i.Lock()
|
|
defer i.Unlock()
|
|
|
|
idx := -1
|
|
for ii, u := range i.users {
|
|
if strings.EqualFold(u.Email, email) {
|
|
idx = ii
|
|
break
|
|
}
|
|
}
|
|
|
|
if idx == -1 {
|
|
return newError("User ", email, " not found.")
|
|
}
|
|
|
|
ulen := len(i.users)
|
|
|
|
i.users[idx] = i.users[ulen-1]
|
|
i.users[ulen-1] = nil
|
|
i.users = i.users[:ulen-1]
|
|
|
|
// sync to multi service
|
|
// Considering implements shadowsocks2022 in xray-core may have better performance.
|
|
i.service.UpdateUsersWithPasswords(
|
|
C.MapIndexed(i.users, func(index int, it *User) int { return index }),
|
|
C.Map(i.users, func(it *User) string { return it.Key }),
|
|
)
|
|
|
|
return nil
|
|
}
|
|
|
|
func (i *MultiUserInbound) Network() []net.Network {
|
|
return i.networks
|
|
}
|
|
|
|
func (i *MultiUserInbound) Process(ctx context.Context, network net.Network, connection stat.Connection, dispatcher routing.Dispatcher) error {
|
|
inbound := session.InboundFromContext(ctx)
|
|
inbound.Name = "shadowsocks-2022-multi"
|
|
inbound.CanSpliceCopy = 3
|
|
|
|
var metadata M.Metadata
|
|
if inbound.Source.IsValid() {
|
|
metadata.Source = M.ParseSocksaddr(inbound.Source.NetAddr())
|
|
}
|
|
|
|
ctx = session.ContextWithDispatcher(ctx, dispatcher)
|
|
|
|
if network == net.Network_TCP {
|
|
return singbridge.ReturnError(i.service.NewConnection(ctx, connection, metadata))
|
|
} else {
|
|
reader := buf.NewReader(connection)
|
|
pc := &natPacketConn{connection}
|
|
for {
|
|
mb, err := reader.ReadMultiBuffer()
|
|
if err != nil {
|
|
buf.ReleaseMulti(mb)
|
|
return singbridge.ReturnError(err)
|
|
}
|
|
for _, buffer := range mb {
|
|
packet := B.As(buffer.Bytes()).ToOwned()
|
|
buffer.Release()
|
|
err = i.service.NewPacket(ctx, pc, packet, metadata)
|
|
if err != nil {
|
|
packet.Release()
|
|
buf.ReleaseMulti(mb)
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
func (i *MultiUserInbound) NewConnection(ctx context.Context, conn net.Conn, metadata M.Metadata) error {
|
|
inbound := session.InboundFromContext(ctx)
|
|
userInt, _ := A.UserFromContext[int](ctx)
|
|
user := i.users[userInt]
|
|
inbound.User = &protocol.MemoryUser{
|
|
Email: user.Email,
|
|
Level: uint32(user.Level),
|
|
}
|
|
ctx = log.ContextWithAccessMessage(ctx, &log.AccessMessage{
|
|
From: metadata.Source,
|
|
To: metadata.Destination,
|
|
Status: log.AccessAccepted,
|
|
Email: user.Email,
|
|
})
|
|
newError("tunnelling request to tcp:", metadata.Destination).WriteToLog(session.ExportIDToError(ctx))
|
|
dispatcher := session.DispatcherFromContext(ctx)
|
|
destination := singbridge.ToDestination(metadata.Destination, net.Network_TCP)
|
|
if !destination.IsValid() {
|
|
return newError("invalid destination")
|
|
}
|
|
|
|
link, err := dispatcher.Dispatch(ctx, destination)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return singbridge.CopyConn(ctx, conn, link, conn)
|
|
}
|
|
|
|
func (i *MultiUserInbound) NewPacketConnection(ctx context.Context, conn N.PacketConn, metadata M.Metadata) error {
|
|
inbound := session.InboundFromContext(ctx)
|
|
userInt, _ := A.UserFromContext[int](ctx)
|
|
user := i.users[userInt]
|
|
inbound.User = &protocol.MemoryUser{
|
|
Email: user.Email,
|
|
Level: uint32(user.Level),
|
|
}
|
|
ctx = log.ContextWithAccessMessage(ctx, &log.AccessMessage{
|
|
From: metadata.Source,
|
|
To: metadata.Destination,
|
|
Status: log.AccessAccepted,
|
|
Email: user.Email,
|
|
})
|
|
newError("tunnelling request to udp:", metadata.Destination).WriteToLog(session.ExportIDToError(ctx))
|
|
dispatcher := session.DispatcherFromContext(ctx)
|
|
destination := singbridge.ToDestination(metadata.Destination, net.Network_UDP)
|
|
link, err := dispatcher.Dispatch(ctx, destination)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
outConn := &singbridge.PacketConnWrapper{
|
|
Reader: link.Reader,
|
|
Writer: link.Writer,
|
|
Dest: destination,
|
|
}
|
|
return bufio.CopyPacketConn(ctx, conn, outConn)
|
|
}
|
|
|
|
func (i *MultiUserInbound) NewError(ctx context.Context, err error) {
|
|
if E.IsClosed(err) {
|
|
return
|
|
}
|
|
newError(err).AtWarning().WriteToLog()
|
|
}
|