-
Notifications
You must be signed in to change notification settings - Fork 13
/
Copy pathpacket_server.go
238 lines (217 loc) · 5.16 KB
/
packet_server.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
package shadowsocks
import (
"context"
"fmt"
"net"
"strings"
"sync"
"time"
)
type PacketServer struct {
// ProxyNetwork network between a proxy server and a client
ProxyNetwork string
// ProxyAddress proxy server address
ProxyAddress string
// Context is default context
Context context.Context
// ProxyPacket specifies the optional dial function for
// establishing the transport connection.
ProxyPacket func(ctx context.Context, network, address string) (net.PacketConn, error)
// Cipher use cipher protocol
Cipher string
// Password use password authentication
Password string
// ConnCipher is connect the cipher codec
ConnCipher ConnCipher
// IsResolve resolve domain name on locally
IsResolve bool
// Resolver optionally specifies an alternate resolver to use
Resolver *net.Resolver
// Timeout is the maximum amount of time a dial will wait for
// a connect to complete. The default is no timeout
Timeout time.Duration
// Logger error log
Logger Logger
// BytesPool getting and returning temporary bytes
BytesPool BytesPool
connTableMut sync.Mutex
connTable map[string]*session
}
type session struct {
last time.Time
conn net.PacketConn
}
func NewPacketServer() *PacketServer {
return &PacketServer{
Context: context.Background(),
ProxyNetwork: "udp",
connTable: map[string]*session{},
}
}
// ListenAndServe is used to create a listener and serve on it
func (p *PacketServer) ListenAndServe(network, addr string) error {
var lc net.ListenConfig
l, err := lc.ListenPacket(p.context(), network, addr)
if err != nil {
return err
}
return p.ServePacket(l)
}
func (p *PacketServer) ServePacket(conn net.PacketConn) error {
ps := &packetServer{
PacketConn: conn,
BytesPool: p.BytesPool,
Encryptor: p.ConnCipher,
}
ctx, cancel := context.WithCancel(p.context())
defer cancel()
go p.gcTask(ctx)
for {
buf := getBytes(p.BytesPool)
i, src, dest, err := ps.readFrom(buf[:])
if err != nil {
return err
}
go func() {
defer putBytes(p.BytesPool, buf)
p.forward(ps, src, dest, buf[:i])
}()
}
}
func (p *PacketServer) gcTask(ctx context.Context) {
timeout := p.Timeout
if timeout == 0 {
timeout = time.Minute
}
tick := time.NewTicker(timeout)
for {
select {
case <-tick.C:
p.gc()
case <-ctx.Done():
return
}
}
}
func (p *PacketServer) gc() {
p.connTableMut.Lock()
defer p.connTableMut.Unlock()
deadline := time.Now().Add(-p.Timeout)
for k, sess := range p.connTable {
if deadline.After(sess.last) {
sess.conn.SetDeadline(deadline)
delete(p.connTable, k)
}
}
}
func (p *PacketServer) proxyListenPacket(ctx context.Context, network, address string) (net.PacketConn, error) {
proxyPacket := p.ProxyPacket
if proxyPacket == nil {
var listenConfig net.ListenConfig
proxyPacket = listenConfig.ListenPacket
}
return proxyPacket(ctx, network, address)
}
func (p *PacketServer) forward(conn *packetServer, src, dest net.Addr, buf []byte) {
sess, err := p.session(conn, src, dest)
if err != nil {
if p.Logger != nil {
p.Logger.Println(err)
}
return
}
_, err = sess.conn.WriteTo(buf, dest)
if err != nil {
if p.Logger != nil {
p.Logger.Println(err)
}
}
}
func (p *PacketServer) session(conn *packetServer, src, dest net.Addr) (*session, error) {
key := strings.Join([]string{src.String(), dest.String()}, "|")
p.connTableMut.Lock()
sess, ok := p.connTable[key]
if ok {
sess.last = time.Now()
p.connTableMut.Unlock()
return sess, nil
}
p.connTableMut.Unlock()
forward, err := p.proxyListenPacket(p.context(), p.ProxyNetwork, ":0")
if err != nil {
return nil, err
}
sess = &session{
last: time.Now(),
conn: forward,
}
p.connTableMut.Lock()
p.connTable[key] = sess
p.connTableMut.Unlock()
go func() {
key := dest.String()
buf := getBytes(p.BytesPool)
defer putBytes(p.BytesPool, buf)
for {
n, addr, err := forward.ReadFrom(buf[:])
if err != nil {
if p.Logger != nil {
p.Logger.Println(err)
}
return
}
if addr.String() != key {
continue
}
_, err = conn.writeTo(buf[:n], dest, src)
if err != nil {
if p.Logger != nil {
p.Logger.Println(err)
}
return
}
}
}()
return sess, nil
}
func (p *PacketServer) context() context.Context {
if p.Context == nil {
return context.Background()
}
return p.Context
}
type packetServer struct {
net.PacketConn
Encryptor ConnCipher
BytesPool BytesPool
}
func (p *packetServer) readFrom(b []byte) (n int, ori, addr net.Addr, err error) {
buf := getBytes(p.BytesPool)
defer putBytes(p.BytesPool, buf)
n, a, err := p.PacketConn.ReadFrom(buf)
if err != nil {
return 0, nil, nil, err
}
n, addr, err = decryptPacket(p.Encryptor, p.BytesPool, b, buf[:n])
if err != nil {
return 0, nil, nil, fmt.Errorf("from %v: %v", a, err)
}
addr, err = toUDPAddr(addr)
if err != nil {
return 0, nil, nil, err
}
return n, a, addr, nil
}
func (p *packetServer) writeTo(b []byte, ori, addr net.Addr) (n int, err error) {
buf := getBytes(p.BytesPool)
defer putBytes(p.BytesPool, buf)
n, err = encryptPacket(p.Encryptor, p.BytesPool, buf, b, ori)
if err != nil {
return 0, err
}
_, err = p.PacketConn.WriteTo(buf[:n], addr)
if err != nil {
return 0, err
}
return len(b), nil
}