2015-09-11 14:12:09 +02:00
|
|
|
package freedom
|
2015-09-09 17:39:06 +02:00
|
|
|
|
2017-12-03 01:04:57 +01:00
|
|
|
//go:generate go run $GOPATH/src/v2ray.com/core/common/errors/errorgen/main.go -pkg freedom -path Proxy,Freedom
|
2017-04-09 01:43:25 +02:00
|
|
|
|
2015-09-09 17:39:06 +02:00
|
|
|
import (
|
2017-01-13 00:56:21 +01:00
|
|
|
"context"
|
2018-01-10 12:22:37 +01:00
|
|
|
"time"
|
2016-12-09 13:17:34 +01:00
|
|
|
|
2018-01-10 12:22:37 +01:00
|
|
|
"v2ray.com/core"
|
2016-12-28 00:53:29 +01:00
|
|
|
"v2ray.com/core/common"
|
2016-12-09 11:35:27 +01:00
|
|
|
"v2ray.com/core/common/buf"
|
2016-08-20 20:55:45 +02:00
|
|
|
"v2ray.com/core/common/dice"
|
2017-01-13 23:42:39 +01:00
|
|
|
"v2ray.com/core/common/net"
|
2016-08-20 20:55:45 +02:00
|
|
|
"v2ray.com/core/common/retry"
|
2016-12-30 00:32:20 +01:00
|
|
|
"v2ray.com/core/common/signal"
|
2016-08-20 20:55:45 +02:00
|
|
|
"v2ray.com/core/proxy"
|
|
|
|
"v2ray.com/core/transport/internet"
|
|
|
|
"v2ray.com/core/transport/ray"
|
2015-09-09 17:39:06 +02:00
|
|
|
)
|
|
|
|
|
2017-11-15 18:28:39 +01:00
|
|
|
// Handler handles Freedom connections.
|
2016-12-22 13:33:28 +01:00
|
|
|
type Handler struct {
|
2018-01-10 12:22:37 +01:00
|
|
|
policyManager core.PolicyManager
|
|
|
|
dns core.DNSClient
|
|
|
|
config Config
|
2016-05-22 22:30:21 +02:00
|
|
|
}
|
|
|
|
|
2017-11-15 18:28:39 +01:00
|
|
|
// New creates a new Freedom handler.
|
2017-01-13 00:56:21 +01:00
|
|
|
func New(ctx context.Context, config *Config) (*Handler, error) {
|
2018-02-21 17:05:29 +01:00
|
|
|
v := core.MustFromContext(ctx)
|
2016-12-22 13:33:28 +01:00
|
|
|
f := &Handler{
|
2018-01-10 12:22:37 +01:00
|
|
|
config: *config,
|
|
|
|
policyManager: v.PolicyManager(),
|
|
|
|
dns: v.DNSClient(),
|
2016-05-22 22:30:21 +02:00
|
|
|
}
|
2018-01-10 12:22:37 +01:00
|
|
|
|
2017-01-13 00:56:21 +01:00
|
|
|
return f, nil
|
2016-05-22 22:30:21 +02:00
|
|
|
}
|
|
|
|
|
2018-01-10 12:22:37 +01:00
|
|
|
func (h *Handler) policy() core.Policy {
|
|
|
|
p := h.policyManager.ForLevel(h.config.UserLevel)
|
|
|
|
if h.config.Timeout > 0 && h.config.UserLevel == 0 {
|
|
|
|
p.Timeouts.ConnectionIdle = time.Duration(h.config.Timeout) * time.Second
|
|
|
|
}
|
|
|
|
return p
|
|
|
|
}
|
|
|
|
|
2017-11-15 18:28:39 +01:00
|
|
|
func (h *Handler) resolveIP(ctx context.Context, domain string) net.Address {
|
2017-11-15 12:55:54 +01:00
|
|
|
if resolver, ok := proxy.ResolvedIPsFromContext(ctx); ok {
|
|
|
|
ips := resolver.Resolve()
|
|
|
|
if len(ips) == 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return ips[dice.Roll(len(ips))]
|
2016-05-22 22:30:21 +02:00
|
|
|
}
|
|
|
|
|
2018-01-10 12:22:37 +01:00
|
|
|
ips, err := h.dns.LookupIP(domain)
|
2017-12-19 23:55:09 +01:00
|
|
|
if err != nil {
|
2018-02-22 15:26:00 +01:00
|
|
|
newError("failed to get IP address for domain ", domain).Base(err).WithContext(ctx).WriteToLog()
|
2017-12-19 23:55:09 +01:00
|
|
|
}
|
2016-05-22 22:30:21 +02:00
|
|
|
if len(ips) == 0 {
|
2017-11-15 12:55:54 +01:00
|
|
|
return nil
|
2016-05-22 22:30:21 +02:00
|
|
|
}
|
2017-11-15 12:55:54 +01:00
|
|
|
return net.IPAddress(ips[dice.Roll(len(ips))])
|
2015-09-09 17:39:06 +02:00
|
|
|
}
|
|
|
|
|
2017-11-15 18:28:39 +01:00
|
|
|
// Process implements proxy.Outbound.
|
|
|
|
func (h *Handler) Process(ctx context.Context, outboundRay ray.OutboundRay, dialer proxy.Dialer) error {
|
2017-02-09 22:49:38 +01:00
|
|
|
destination, _ := proxy.TargetFromContext(ctx)
|
2018-01-10 12:22:37 +01:00
|
|
|
if h.config.DestinationOverride != nil {
|
|
|
|
server := h.config.DestinationOverride.Server
|
2017-01-26 23:05:24 +01:00
|
|
|
destination = net.Destination{
|
|
|
|
Network: destination.Network,
|
|
|
|
Address: server.Address.AsAddress(),
|
|
|
|
Port: net.Port(server.Port),
|
|
|
|
}
|
|
|
|
}
|
2018-02-22 15:26:00 +01:00
|
|
|
newError("opening connection to ", destination).WithContext(ctx).WriteToLog()
|
2015-12-17 01:19:04 +01:00
|
|
|
|
2017-01-26 20:46:44 +01:00
|
|
|
input := outboundRay.OutboundInput()
|
|
|
|
output := outboundRay.OutboundOutput()
|
2016-04-18 18:44:10 +02:00
|
|
|
|
2018-01-10 12:22:37 +01:00
|
|
|
if h.config.DomainStrategy == Config_USE_IP && destination.Address.Family().IsDomain() {
|
2017-11-15 18:28:39 +01:00
|
|
|
ip := h.resolveIP(ctx, destination.Address.Domain())
|
2017-11-15 12:55:54 +01:00
|
|
|
if ip != nil {
|
|
|
|
destination = net.Destination{
|
|
|
|
Network: destination.Network,
|
|
|
|
Address: ip,
|
|
|
|
Port: destination.Port,
|
|
|
|
}
|
2018-02-22 15:26:00 +01:00
|
|
|
newError("changing destination to ", destination).WithContext(ctx).WriteToLog()
|
2017-11-15 12:55:54 +01:00
|
|
|
}
|
2016-05-22 22:30:21 +02:00
|
|
|
}
|
2017-01-26 20:46:44 +01:00
|
|
|
|
2017-11-15 18:28:39 +01:00
|
|
|
var conn internet.Connection
|
2016-11-20 21:47:51 +01:00
|
|
|
err := retry.ExponentialBackoff(5, 100).On(func() error {
|
2017-01-26 20:46:44 +01:00
|
|
|
rawConn, err := dialer.Dial(ctx, destination)
|
2015-12-17 01:19:04 +01:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
conn = rawConn
|
|
|
|
return nil
|
|
|
|
})
|
2015-09-09 17:39:25 +02:00
|
|
|
if err != nil {
|
2017-04-09 01:43:25 +02:00
|
|
|
return newError("failed to open connection to ", destination).Base(err)
|
2015-09-22 14:45:03 +02:00
|
|
|
}
|
2015-12-15 16:38:25 +01:00
|
|
|
defer conn.Close()
|
2015-09-22 14:45:03 +02:00
|
|
|
|
2017-11-15 00:36:14 +01:00
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
2018-01-10 12:22:37 +01:00
|
|
|
timer := signal.CancelAfterInactivity(ctx, cancel, h.policy().Timeouts.ConnectionIdle)
|
2017-01-31 12:42:05 +01:00
|
|
|
|
2016-12-30 00:32:20 +01:00
|
|
|
requestDone := signal.ExecuteAsync(func() error {
|
2018-02-19 21:38:04 +01:00
|
|
|
defer timer.SetTimeout(h.policy().Timeouts.DownlinkOnly)
|
|
|
|
|
2017-04-16 09:57:28 +02:00
|
|
|
var writer buf.Writer
|
|
|
|
if destination.Network == net.Network_TCP {
|
|
|
|
writer = buf.NewWriter(conn)
|
|
|
|
} else {
|
2017-04-21 14:51:09 +02:00
|
|
|
writer = buf.NewSequentialWriter(conn)
|
2017-04-16 09:57:28 +02:00
|
|
|
}
|
2017-04-27 22:30:48 +02:00
|
|
|
if err := buf.Copy(input, writer, buf.UpdateActivity(timer)); err != nil {
|
2017-04-16 22:48:51 +02:00
|
|
|
return newError("failed to process request").Base(err)
|
2016-11-22 00:17:49 +01:00
|
|
|
}
|
2018-02-19 21:38:04 +01:00
|
|
|
|
2016-12-30 00:32:20 +01:00
|
|
|
return nil
|
|
|
|
})
|
2015-09-22 18:31:06 +02:00
|
|
|
|
2016-12-30 00:32:20 +01:00
|
|
|
responseDone := signal.ExecuteAsync(func() error {
|
2018-02-19 21:38:04 +01:00
|
|
|
defer timer.SetTimeout(h.policy().Timeouts.UplinkOnly)
|
2016-12-30 00:32:20 +01:00
|
|
|
|
2017-01-31 12:42:05 +01:00
|
|
|
v2reader := buf.NewReader(conn)
|
2017-04-27 22:30:48 +02:00
|
|
|
if err := buf.Copy(v2reader, output, buf.UpdateActivity(timer)); err != nil {
|
2017-04-16 22:48:51 +02:00
|
|
|
return newError("failed to process response").Base(err)
|
2016-12-30 00:32:20 +01:00
|
|
|
}
|
2018-02-19 21:38:04 +01:00
|
|
|
|
2016-12-30 00:32:20 +01:00
|
|
|
return nil
|
|
|
|
})
|
|
|
|
|
2017-01-28 21:24:46 +01:00
|
|
|
if err := signal.ErrorOrFinish2(ctx, requestDone, responseDone); err != nil {
|
2017-01-10 14:22:42 +01:00
|
|
|
input.CloseError()
|
|
|
|
output.CloseError()
|
2017-04-09 01:43:25 +02:00
|
|
|
return newError("connection ends").Base(err)
|
2016-11-22 00:17:49 +01:00
|
|
|
}
|
2017-01-26 20:46:44 +01:00
|
|
|
|
|
|
|
return nil
|
2015-09-09 17:39:06 +02:00
|
|
|
}
|
2016-05-22 22:30:21 +02:00
|
|
|
|
|
|
|
func init() {
|
2017-01-13 00:56:21 +01:00
|
|
|
common.Must(common.RegisterConfig((*Config)(nil), func(ctx context.Context, config interface{}) (interface{}, error) {
|
|
|
|
return New(ctx, config.(*Config))
|
|
|
|
}))
|
2016-05-22 22:30:21 +02:00
|
|
|
}
|