Clash.Meta/component/vmess/vmess.go

176 lines
3.6 KiB
Go
Raw Normal View History

2018-09-06 10:53:29 +08:00
package vmess
import (
2018-09-08 19:53:24 +08:00
"crypto/tls"
2018-09-06 10:53:29 +08:00
"fmt"
"math/rand"
"net"
"runtime"
"sync"
2018-09-06 10:53:29 +08:00
"github.com/gofrs/uuid"
)
// Version of vmess
const Version byte = 1
// Request Options
const (
OptionChunkStream byte = 1
OptionChunkMasking byte = 4
)
// Security type vmess
type Security = byte
// Cipher types
const (
SecurityAES128GCM Security = 3
SecurityCHACHA20POLY1305 Security = 4
SecurityNone Security = 5
)
// CipherMapping return
var CipherMapping = map[string]byte{
"none": SecurityNone,
"aes-128-gcm": SecurityAES128GCM,
"chacha20-poly1305": SecurityCHACHA20POLY1305,
}
var (
clientSessionCache tls.ClientSessionCache
once sync.Once
)
2018-09-06 10:53:29 +08:00
// Command types
const (
CommandTCP byte = 1
CommandUDP byte = 2
)
// Addr types
const (
AtypIPv4 byte = 1
AtypDomainName byte = 2
AtypIPv6 byte = 3
)
// DstAddr store destination address
type DstAddr struct {
AddrType byte
Addr []byte
Port uint
}
// Client is vmess connection generator
type Client struct {
user []*ID
uuid *uuid.UUID
security Security
tls bool
host string
2019-02-11 15:25:10 +08:00
wsConfig *WebsocketConfig
tlsConfig *tls.Config
2018-09-06 10:53:29 +08:00
}
// Config of vmess
type Config struct {
UUID string
AlterID uint16
Security string
TLS bool
HostName string
Port string
NetWork string
WebSocketPath string
WebSocketHeaders map[string]string
SkipCertVerify bool
SessionCacahe tls.ClientSessionCache
2018-09-06 10:53:29 +08:00
}
// New return a Conn with net.Conn and DstAddr
2018-10-28 23:46:32 +08:00
func (c *Client) New(conn net.Conn, dst *DstAddr) (net.Conn, error) {
var err error
2018-09-06 10:53:29 +08:00
r := rand.Intn(len(c.user))
if c.wsConfig != nil {
2019-02-11 15:25:10 +08:00
conn, err = NewWebsocketConn(conn, c.wsConfig)
2018-10-28 23:46:32 +08:00
if err != nil {
return nil, err
2018-10-28 23:46:32 +08:00
}
} else if c.tls {
conn = tls.Client(conn, c.tlsConfig)
2018-09-08 19:53:24 +08:00
}
2019-02-15 21:55:15 +08:00
return newConn(conn, c.user[r], dst, c.security)
2018-09-06 10:53:29 +08:00
}
// NewClient return Client instance
func NewClient(config Config) (*Client, error) {
uid, err := uuid.FromString(config.UUID)
if err != nil {
return nil, err
}
var security Security
switch config.Security {
case "aes-128-gcm":
security = SecurityAES128GCM
case "chacha20-poly1305":
security = SecurityCHACHA20POLY1305
case "none":
security = SecurityNone
case "auto":
security = SecurityCHACHA20POLY1305
if runtime.GOARCH == "amd64" || runtime.GOARCH == "s390x" || runtime.GOARCH == "arm64" {
security = SecurityAES128GCM
}
default:
return nil, fmt.Errorf("Unknown security type: %s", config.Security)
}
2018-10-28 23:46:32 +08:00
if config.NetWork != "" && config.NetWork != "ws" {
return nil, fmt.Errorf("Unknown network type: %s", config.NetWork)
}
2018-11-28 23:24:57 +08:00
host := net.JoinHostPort(config.HostName, config.Port)
var tlsConfig *tls.Config
if config.TLS {
tlsConfig = &tls.Config{
2018-11-28 23:24:57 +08:00
ServerName: config.HostName,
InsecureSkipVerify: config.SkipCertVerify,
ClientSessionCache: config.SessionCacahe,
}
if tlsConfig.ClientSessionCache == nil {
tlsConfig.ClientSessionCache = getClientSessionCache()
}
}
2019-02-11 15:25:10 +08:00
var wsConfig *WebsocketConfig
if config.NetWork == "ws" {
2019-02-11 15:25:10 +08:00
wsConfig = &WebsocketConfig{
Host: host,
Path: config.WebSocketPath,
Headers: config.WebSocketHeaders,
TLS: config.TLS,
TLSConfig: tlsConfig,
}
}
2018-09-06 10:53:29 +08:00
return &Client{
user: newAlterIDs(newID(&uid), config.AlterID),
uuid: &uid,
security: security,
tls: config.TLS,
2018-11-28 23:24:57 +08:00
host: host,
wsConfig: wsConfig,
tlsConfig: tlsConfig,
2018-09-06 10:53:29 +08:00
}, nil
}
func getClientSessionCache() tls.ClientSessionCache {
once.Do(func() {
clientSessionCache = tls.NewLRUClientSessionCache(128)
})
return clientSessionCache
}