mirror of
https://github.com/SagerNet/sing-quic.git
synced 2025-04-03 20:07:39 +03:00
390 lines
10 KiB
Go
390 lines
10 KiB
Go
package hysteria2
|
|
|
|
import (
|
|
"context"
|
|
"io"
|
|
"math"
|
|
"net"
|
|
"net/http"
|
|
"net/url"
|
|
"os"
|
|
"runtime"
|
|
"strconv"
|
|
"strings"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/sagernet/quic-go"
|
|
"github.com/sagernet/quic-go/congestion"
|
|
"github.com/sagernet/quic-go/http3"
|
|
"github.com/sagernet/sing-quic"
|
|
congestion_meta1 "github.com/sagernet/sing-quic/congestion_meta1"
|
|
congestion_meta2 "github.com/sagernet/sing-quic/congestion_meta2"
|
|
"github.com/sagernet/sing-quic/hysteria"
|
|
hyCC "github.com/sagernet/sing-quic/hysteria/congestion"
|
|
"github.com/sagernet/sing-quic/hysteria2/internal/protocol"
|
|
"github.com/sagernet/sing/common/baderror"
|
|
"github.com/sagernet/sing/common/bufio"
|
|
E "github.com/sagernet/sing/common/exceptions"
|
|
"github.com/sagernet/sing/common/logger"
|
|
M "github.com/sagernet/sing/common/metadata"
|
|
N "github.com/sagernet/sing/common/network"
|
|
"github.com/sagernet/sing/common/ntp"
|
|
aTLS "github.com/sagernet/sing/common/tls"
|
|
)
|
|
|
|
type ClientOptions struct {
|
|
Context context.Context
|
|
Dialer N.Dialer
|
|
Logger logger.Logger
|
|
BrutalDebug bool
|
|
ServerAddress M.Socksaddr
|
|
ServerPorts []string
|
|
HopInterval time.Duration
|
|
SendBPS uint64
|
|
ReceiveBPS uint64
|
|
SalamanderPassword string
|
|
Password string
|
|
TLSConfig aTLS.Config
|
|
UDPDisabled bool
|
|
}
|
|
|
|
type Client struct {
|
|
ctx context.Context
|
|
dialer N.Dialer
|
|
logger logger.Logger
|
|
brutalDebug bool
|
|
serverAddr M.Socksaddr
|
|
serverPorts []uint16
|
|
hopInterval time.Duration
|
|
sendBPS uint64
|
|
receiveBPS uint64
|
|
salamanderPassword string
|
|
password string
|
|
tlsConfig aTLS.Config
|
|
quicConfig *quic.Config
|
|
udpDisabled bool
|
|
|
|
connAccess sync.RWMutex
|
|
conn *clientQUICConnection
|
|
}
|
|
|
|
func NewClient(options ClientOptions) (*Client, error) {
|
|
quicConfig := &quic.Config{
|
|
DisablePathMTUDiscovery: !(runtime.GOOS == "windows" || runtime.GOOS == "linux" || runtime.GOOS == "android" || runtime.GOOS == "darwin"),
|
|
EnableDatagrams: !options.UDPDisabled,
|
|
InitialStreamReceiveWindow: hysteria.DefaultStreamReceiveWindow,
|
|
MaxStreamReceiveWindow: hysteria.DefaultStreamReceiveWindow,
|
|
InitialConnectionReceiveWindow: hysteria.DefaultConnReceiveWindow,
|
|
MaxConnectionReceiveWindow: hysteria.DefaultConnReceiveWindow,
|
|
MaxIdleTimeout: hysteria.DefaultMaxIdleTimeout,
|
|
KeepAlivePeriod: hysteria.DefaultKeepAlivePeriod,
|
|
}
|
|
if len(options.TLSConfig.NextProtos()) == 0 {
|
|
options.TLSConfig.SetNextProtos([]string{http3.NextProtoH3})
|
|
}
|
|
var serverPorts []uint16
|
|
if len(options.ServerPorts) > 0 {
|
|
var err error
|
|
serverPorts, err = parsePorts(options.ServerPorts)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
return &Client{
|
|
ctx: options.Context,
|
|
dialer: options.Dialer,
|
|
logger: options.Logger,
|
|
brutalDebug: options.BrutalDebug,
|
|
serverAddr: options.ServerAddress,
|
|
serverPorts: serverPorts,
|
|
hopInterval: options.HopInterval,
|
|
sendBPS: options.SendBPS,
|
|
receiveBPS: options.ReceiveBPS,
|
|
salamanderPassword: options.SalamanderPassword,
|
|
password: options.Password,
|
|
tlsConfig: options.TLSConfig,
|
|
quicConfig: quicConfig,
|
|
udpDisabled: options.UDPDisabled,
|
|
}, nil
|
|
}
|
|
|
|
func parsePorts(serverPorts []string) ([]uint16, error) {
|
|
var portList []uint16
|
|
for _, portRange := range serverPorts {
|
|
if !strings.Contains(portRange, ":") {
|
|
return nil, E.New("bad port range: ", portRange)
|
|
}
|
|
subIndex := strings.Index(portRange, ":")
|
|
var (
|
|
start, end uint64
|
|
err error
|
|
)
|
|
if subIndex > 0 {
|
|
start, err = strconv.ParseUint(portRange[:subIndex], 10, 16)
|
|
if err != nil {
|
|
return nil, E.Cause(err, E.Cause(err, "bad port range: ", portRange))
|
|
}
|
|
}
|
|
if subIndex == len(portRange)-1 {
|
|
end = math.MaxUint16
|
|
} else {
|
|
end, err = strconv.ParseUint(portRange[subIndex+1:], 10, 16)
|
|
if err != nil {
|
|
return nil, E.Cause(err, E.Cause(err, "bad port range: ", portRange))
|
|
}
|
|
}
|
|
for i := start; i <= end; i++ {
|
|
portList = append(portList, uint16(i))
|
|
}
|
|
}
|
|
return portList, nil
|
|
}
|
|
|
|
func (c *Client) offer(ctx context.Context) (*clientQUICConnection, error) {
|
|
conn := c.conn
|
|
if conn != nil && conn.active() {
|
|
return conn, nil
|
|
}
|
|
c.connAccess.Lock()
|
|
defer c.connAccess.Unlock()
|
|
conn = c.conn
|
|
if conn != nil && conn.active() {
|
|
return conn, nil
|
|
}
|
|
conn, err := c.offerNew(ctx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return conn, nil
|
|
}
|
|
|
|
func (c *Client) offerNew(ctx context.Context) (*clientQUICConnection, error) {
|
|
dialFunc := func(serverAddr M.Socksaddr) (net.PacketConn, error) {
|
|
udpConn, err := c.dialer.DialContext(c.ctx, "udp", serverAddr)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
var packetConn net.PacketConn
|
|
packetConn = bufio.NewUnbindPacketConn(udpConn)
|
|
if c.salamanderPassword != "" {
|
|
packetConn = NewSalamanderConn(packetConn, []byte(c.salamanderPassword))
|
|
}
|
|
return packetConn, nil
|
|
}
|
|
var (
|
|
packetConn net.PacketConn
|
|
err error
|
|
)
|
|
if len(c.serverPorts) == 0 {
|
|
packetConn, err = dialFunc(c.serverAddr)
|
|
} else {
|
|
packetConn, err = NewHopPacketConn(dialFunc, c.serverAddr, c.serverPorts, c.hopInterval)
|
|
}
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
var quicConn quic.EarlyConnection
|
|
http3Transport, err := qtls.CreateTransport(packetConn, &quicConn, c.serverAddr, c.tlsConfig, c.quicConfig)
|
|
if err != nil {
|
|
packetConn.Close()
|
|
return nil, err
|
|
}
|
|
request := &http.Request{
|
|
Method: http.MethodPost,
|
|
URL: &url.URL{
|
|
Scheme: "https",
|
|
Host: protocol.URLHost,
|
|
Path: protocol.URLPath,
|
|
},
|
|
Header: make(http.Header),
|
|
}
|
|
protocol.AuthRequestToHeader(request.Header, protocol.AuthRequest{Auth: c.password, Rx: c.receiveBPS})
|
|
response, err := http3Transport.RoundTrip(request.WithContext(ctx))
|
|
if err != nil {
|
|
if quicConn != nil {
|
|
quicConn.CloseWithError(0, "")
|
|
}
|
|
packetConn.Close()
|
|
return nil, err
|
|
}
|
|
if response.StatusCode != protocol.StatusAuthOK {
|
|
if quicConn != nil {
|
|
quicConn.CloseWithError(0, "")
|
|
}
|
|
packetConn.Close()
|
|
return nil, E.New("authentication failed, status code: ", response.StatusCode)
|
|
}
|
|
response.Body.Close()
|
|
authResponse := protocol.AuthResponseFromHeader(response.Header)
|
|
actualTx := authResponse.Rx
|
|
if actualTx == 0 || actualTx > c.sendBPS {
|
|
actualTx = c.sendBPS
|
|
}
|
|
if !authResponse.RxAuto && actualTx > 0 {
|
|
quicConn.SetCongestionControl(hyCC.NewBrutalSender(actualTx, c.brutalDebug, c.logger))
|
|
} else {
|
|
timeFunc := ntp.TimeFuncFromContext(c.ctx)
|
|
if timeFunc == nil {
|
|
timeFunc = time.Now
|
|
}
|
|
quicConn.SetCongestionControl(congestion_meta2.NewBbrSender(
|
|
congestion_meta2.DefaultClock{TimeFunc: timeFunc},
|
|
congestion.ByteCount(quicConn.Config().InitialPacketSize),
|
|
congestion.ByteCount(congestion_meta1.InitialCongestionWindow),
|
|
))
|
|
}
|
|
conn := &clientQUICConnection{
|
|
quicConn: quicConn,
|
|
rawConn: packetConn,
|
|
connDone: make(chan struct{}),
|
|
udpDisabled: !authResponse.UDPEnabled,
|
|
udpConnMap: make(map[uint32]*udpPacketConn),
|
|
}
|
|
if !c.udpDisabled {
|
|
go c.loopMessages(conn)
|
|
}
|
|
c.conn = conn
|
|
return conn, nil
|
|
}
|
|
|
|
func (c *Client) DialConn(ctx context.Context, destination M.Socksaddr) (net.Conn, error) {
|
|
conn, err := c.offer(ctx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
stream, err := conn.quicConn.OpenStream()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &clientConn{
|
|
Stream: stream,
|
|
destination: destination,
|
|
}, nil
|
|
}
|
|
|
|
func (c *Client) ListenPacket(ctx context.Context) (net.PacketConn, error) {
|
|
if c.udpDisabled {
|
|
return nil, os.ErrInvalid
|
|
}
|
|
conn, err := c.offer(ctx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if conn.udpDisabled {
|
|
return nil, E.New("UDP disabled by server")
|
|
}
|
|
var sessionID uint32
|
|
clientPacketConn := newUDPPacketConn(c.ctx, conn.quicConn, func() {
|
|
conn.udpAccess.Lock()
|
|
delete(conn.udpConnMap, sessionID)
|
|
conn.udpAccess.Unlock()
|
|
})
|
|
conn.udpAccess.Lock()
|
|
sessionID = conn.udpSessionID
|
|
conn.udpSessionID++
|
|
conn.udpConnMap[sessionID] = clientPacketConn
|
|
conn.udpAccess.Unlock()
|
|
clientPacketConn.sessionID = sessionID
|
|
return clientPacketConn, nil
|
|
}
|
|
|
|
func (c *Client) CloseWithError(err error) error {
|
|
conn := c.conn
|
|
if conn != nil {
|
|
conn.closeWithError(err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
type clientQUICConnection struct {
|
|
quicConn quic.Connection
|
|
rawConn io.Closer
|
|
closeOnce sync.Once
|
|
connDone chan struct{}
|
|
connErr error
|
|
udpDisabled bool
|
|
udpAccess sync.RWMutex
|
|
udpConnMap map[uint32]*udpPacketConn
|
|
udpSessionID uint32
|
|
}
|
|
|
|
func (c *clientQUICConnection) active() bool {
|
|
select {
|
|
case <-c.quicConn.Context().Done():
|
|
return false
|
|
default:
|
|
}
|
|
select {
|
|
case <-c.connDone:
|
|
return false
|
|
default:
|
|
}
|
|
return true
|
|
}
|
|
|
|
func (c *clientQUICConnection) closeWithError(err error) {
|
|
c.closeOnce.Do(func() {
|
|
c.connErr = err
|
|
close(c.connDone)
|
|
_ = c.quicConn.CloseWithError(0, "")
|
|
_ = c.rawConn.Close()
|
|
})
|
|
}
|
|
|
|
type clientConn struct {
|
|
quic.Stream
|
|
destination M.Socksaddr
|
|
requestWritten bool
|
|
responseRead bool
|
|
}
|
|
|
|
func (c *clientConn) NeedHandshake() bool {
|
|
return !c.requestWritten
|
|
}
|
|
|
|
func (c *clientConn) Read(p []byte) (n int, err error) {
|
|
if c.responseRead {
|
|
n, err = c.Stream.Read(p)
|
|
return n, baderror.WrapQUIC(err)
|
|
}
|
|
status, errorMessage, err := protocol.ReadTCPResponse(c.Stream)
|
|
if err != nil {
|
|
return 0, baderror.WrapQUIC(err)
|
|
}
|
|
if !status {
|
|
err = E.New("remote error: ", errorMessage)
|
|
return
|
|
}
|
|
c.responseRead = true
|
|
n, err = c.Stream.Read(p)
|
|
return n, baderror.WrapQUIC(err)
|
|
}
|
|
|
|
func (c *clientConn) Write(p []byte) (n int, err error) {
|
|
if !c.requestWritten {
|
|
buffer := protocol.WriteTCPRequest(c.destination.String(), p)
|
|
defer buffer.Release()
|
|
_, err = c.Stream.Write(buffer.Bytes())
|
|
if err != nil {
|
|
return
|
|
}
|
|
c.requestWritten = true
|
|
return len(p), nil
|
|
}
|
|
n, err = c.Stream.Write(p)
|
|
return n, baderror.WrapQUIC(err)
|
|
}
|
|
|
|
func (c *clientConn) LocalAddr() net.Addr {
|
|
return M.Socksaddr{}
|
|
}
|
|
|
|
func (c *clientConn) RemoteAddr() net.Addr {
|
|
return M.Socksaddr{}
|
|
}
|
|
|
|
func (c *clientConn) Close() error {
|
|
c.Stream.CancelRead(0)
|
|
return c.Stream.Close()
|
|
}
|