* add http(s) proxy * Add front-end translation * fix ui description * For linux platform, add rustls support * fix: Fix the proxy address test function. * add: Added default prompts for agency agreement and some multi-language translations * add: Http proxy request client * fix: add async http proxy func and format the code * add: Preliminary support for flutter front-end calling rust back-end http request * Optimize HTTP calls * Optimize HTTP calls * fix: Optimize HTTP requests, refine translations, and fix dependencies * fix: Win and macOS compilation errors * fix: web platforms * fix: Optimize import * fix: Fix web platform issues * fix: Fix web platform issues * fix: update ci * fix: test ci * test: test CI * Revert "fix: update ci" This reverts commit 2e5f247b2ed0cc63a6f6f7bbaaffd0a1223712e5. * test: test CI * test: test CI * fix: fix lock file * fix: Optimize imports
342 lines
9.9 KiB
Rust
342 lines
9.9 KiB
Rust
use crate::{bail, bytes_codec::BytesCodec, ResultType, config::Socks5Server, proxy::Proxy};
|
|
use anyhow::Context as AnyhowCtx;
|
|
use bytes::{BufMut, Bytes, BytesMut};
|
|
use futures::{SinkExt, StreamExt};
|
|
use protobuf::Message;
|
|
use sodiumoxide::crypto::{
|
|
box_,
|
|
secretbox::{self, Key, Nonce},
|
|
};
|
|
use std::{
|
|
io::{self, Error, ErrorKind},
|
|
net::{IpAddr, Ipv4Addr, Ipv6Addr, SocketAddr},
|
|
ops::{Deref, DerefMut},
|
|
pin::Pin,
|
|
task::{Context, Poll},
|
|
};
|
|
use tokio::{
|
|
io::{AsyncRead, AsyncWrite, ReadBuf},
|
|
net::{lookup_host, TcpListener, TcpSocket, ToSocketAddrs},
|
|
};
|
|
use tokio_socks::IntoTargetAddr;
|
|
use tokio_util::codec::Framed;
|
|
|
|
pub trait TcpStreamTrait: AsyncRead + AsyncWrite + Unpin {}
|
|
pub struct DynTcpStream(pub(crate) Box<dyn TcpStreamTrait + Send + Sync>);
|
|
|
|
#[derive(Clone)]
|
|
pub struct Encrypt(Key, u64, u64);
|
|
|
|
pub struct FramedStream(
|
|
pub(crate) Framed<DynTcpStream, BytesCodec>,
|
|
pub(crate) SocketAddr,
|
|
pub(crate) Option<Encrypt>,
|
|
pub(crate) u64,
|
|
);
|
|
|
|
impl Deref for FramedStream {
|
|
type Target = Framed<DynTcpStream, BytesCodec>;
|
|
|
|
fn deref(&self) -> &Self::Target {
|
|
&self.0
|
|
}
|
|
}
|
|
|
|
impl DerefMut for FramedStream {
|
|
fn deref_mut(&mut self) -> &mut Self::Target {
|
|
&mut self.0
|
|
}
|
|
}
|
|
|
|
impl Deref for DynTcpStream {
|
|
type Target = Box<dyn TcpStreamTrait + Send + Sync>;
|
|
|
|
fn deref(&self) -> &Self::Target {
|
|
&self.0
|
|
}
|
|
}
|
|
|
|
impl DerefMut for DynTcpStream {
|
|
fn deref_mut(&mut self) -> &mut Self::Target {
|
|
&mut self.0
|
|
}
|
|
}
|
|
|
|
pub(crate) fn new_socket(addr: std::net::SocketAddr, reuse: bool) -> Result<TcpSocket, std::io::Error> {
|
|
let socket = match addr {
|
|
std::net::SocketAddr::V4(..) => TcpSocket::new_v4()?,
|
|
std::net::SocketAddr::V6(..) => TcpSocket::new_v6()?,
|
|
};
|
|
if reuse {
|
|
// windows has no reuse_port, but it's reuse_address
|
|
// almost equals to unix's reuse_port + reuse_address,
|
|
// though may introduce nondeterministic behavior
|
|
#[cfg(unix)]
|
|
socket.set_reuseport(true).ok();
|
|
socket.set_reuseaddr(true).ok();
|
|
}
|
|
socket.bind(addr)?;
|
|
Ok(socket)
|
|
}
|
|
|
|
impl FramedStream {
|
|
pub async fn new<T: ToSocketAddrs + std::fmt::Display>(
|
|
remote_addr: T,
|
|
local_addr: Option<SocketAddr>,
|
|
ms_timeout: u64,
|
|
) -> ResultType<Self> {
|
|
for remote_addr in lookup_host(&remote_addr).await? {
|
|
let local = if let Some(addr) = local_addr {
|
|
addr
|
|
} else {
|
|
crate::config::Config::get_any_listen_addr(remote_addr.is_ipv4())
|
|
};
|
|
if let Ok(socket) = new_socket(local, true) {
|
|
if let Ok(Ok(stream)) =
|
|
super::timeout(ms_timeout, socket.connect(remote_addr)).await
|
|
{
|
|
stream.set_nodelay(true).ok();
|
|
let addr = stream.local_addr()?;
|
|
return Ok(Self(
|
|
Framed::new(DynTcpStream(Box::new(stream)), BytesCodec::new()),
|
|
addr,
|
|
None,
|
|
0,
|
|
));
|
|
}
|
|
}
|
|
}
|
|
bail!(format!("Failed to connect to {remote_addr}"));
|
|
}
|
|
|
|
pub async fn connect<'t, T>(
|
|
target: T,
|
|
local_addr: Option<SocketAddr>,
|
|
proxy_conf: &Socks5Server,
|
|
ms_timeout: u64,
|
|
) -> ResultType<Self>
|
|
where
|
|
T: IntoTargetAddr<'t>,
|
|
{
|
|
let proxy = Proxy::from_conf(proxy_conf, Some(ms_timeout))?;
|
|
proxy.connect::<T>(target, local_addr).await
|
|
}
|
|
|
|
pub fn local_addr(&self) -> SocketAddr {
|
|
self.1
|
|
}
|
|
|
|
pub fn set_send_timeout(&mut self, ms: u64) {
|
|
self.3 = ms;
|
|
}
|
|
|
|
pub fn from(stream: impl TcpStreamTrait + Send + Sync + 'static, addr: SocketAddr) -> Self {
|
|
Self(
|
|
Framed::new(DynTcpStream(Box::new(stream)), BytesCodec::new()),
|
|
addr,
|
|
None,
|
|
0,
|
|
)
|
|
}
|
|
|
|
pub fn set_raw(&mut self) {
|
|
self.0.codec_mut().set_raw();
|
|
self.2 = None;
|
|
}
|
|
|
|
pub fn is_secured(&self) -> bool {
|
|
self.2.is_some()
|
|
}
|
|
|
|
#[inline]
|
|
pub async fn send(&mut self, msg: &impl Message) -> ResultType<()> {
|
|
self.send_raw(msg.write_to_bytes()?).await
|
|
}
|
|
|
|
#[inline]
|
|
pub async fn send_raw(&mut self, msg: Vec<u8>) -> ResultType<()> {
|
|
let mut msg = msg;
|
|
if let Some(key) = self.2.as_mut() {
|
|
msg = key.enc(&msg);
|
|
}
|
|
self.send_bytes(bytes::Bytes::from(msg)).await?;
|
|
Ok(())
|
|
}
|
|
|
|
#[inline]
|
|
pub async fn send_bytes(&mut self, bytes: Bytes) -> ResultType<()> {
|
|
if self.3 > 0 {
|
|
super::timeout(self.3, self.0.send(bytes)).await??;
|
|
} else {
|
|
self.0.send(bytes).await?;
|
|
}
|
|
Ok(())
|
|
}
|
|
|
|
#[inline]
|
|
pub async fn next(&mut self) -> Option<Result<BytesMut, Error>> {
|
|
let mut res = self.0.next().await;
|
|
if let Some(Ok(bytes)) = res.as_mut() {
|
|
if let Some(key) = self.2.as_mut() {
|
|
if let Err(err) = key.dec(bytes) {
|
|
return Some(Err(err));
|
|
}
|
|
}
|
|
}
|
|
res
|
|
}
|
|
|
|
#[inline]
|
|
pub async fn next_timeout(&mut self, ms: u64) -> Option<Result<BytesMut, Error>> {
|
|
if let Ok(res) = super::timeout(ms, self.next()).await {
|
|
res
|
|
} else {
|
|
None
|
|
}
|
|
}
|
|
|
|
pub fn set_key(&mut self, key: Key) {
|
|
self.2 = Some(Encrypt::new(key));
|
|
}
|
|
|
|
fn get_nonce(seqnum: u64) -> Nonce {
|
|
let mut nonce = Nonce([0u8; secretbox::NONCEBYTES]);
|
|
nonce.0[..std::mem::size_of_val(&seqnum)].copy_from_slice(&seqnum.to_le_bytes());
|
|
nonce
|
|
}
|
|
}
|
|
|
|
const DEFAULT_BACKLOG: u32 = 128;
|
|
|
|
pub async fn new_listener<T: ToSocketAddrs>(addr: T, reuse: bool) -> ResultType<TcpListener> {
|
|
if !reuse {
|
|
Ok(TcpListener::bind(addr).await?)
|
|
} else {
|
|
let addr = lookup_host(&addr)
|
|
.await?
|
|
.next()
|
|
.context("could not resolve to any address")?;
|
|
new_socket(addr, true)?
|
|
.listen(DEFAULT_BACKLOG)
|
|
.map_err(anyhow::Error::msg)
|
|
}
|
|
}
|
|
|
|
pub async fn listen_any(port: u16) -> ResultType<TcpListener> {
|
|
if let Ok(mut socket) = TcpSocket::new_v6() {
|
|
#[cfg(unix)]
|
|
{
|
|
socket.set_reuseport(true).ok();
|
|
socket.set_reuseaddr(true).ok();
|
|
use std::os::unix::io::{FromRawFd, IntoRawFd};
|
|
let raw_fd = socket.into_raw_fd();
|
|
let sock2 = unsafe { socket2::Socket::from_raw_fd(raw_fd) };
|
|
sock2.set_only_v6(false).ok();
|
|
socket = unsafe { TcpSocket::from_raw_fd(sock2.into_raw_fd()) };
|
|
}
|
|
#[cfg(windows)]
|
|
{
|
|
use std::os::windows::prelude::{FromRawSocket, IntoRawSocket};
|
|
let raw_socket = socket.into_raw_socket();
|
|
let sock2 = unsafe { socket2::Socket::from_raw_socket(raw_socket) };
|
|
sock2.set_only_v6(false).ok();
|
|
socket = unsafe { TcpSocket::from_raw_socket(sock2.into_raw_socket()) };
|
|
}
|
|
if socket
|
|
.bind(SocketAddr::new(IpAddr::V6(Ipv6Addr::UNSPECIFIED), port))
|
|
.is_ok()
|
|
{
|
|
if let Ok(l) = socket.listen(DEFAULT_BACKLOG) {
|
|
return Ok(l);
|
|
}
|
|
}
|
|
}
|
|
Ok(new_socket(
|
|
SocketAddr::new(IpAddr::V4(Ipv4Addr::UNSPECIFIED), port),
|
|
true,
|
|
)?
|
|
.listen(DEFAULT_BACKLOG)?)
|
|
}
|
|
|
|
impl Unpin for DynTcpStream {}
|
|
|
|
impl AsyncRead for DynTcpStream {
|
|
fn poll_read(
|
|
mut self: Pin<&mut Self>,
|
|
cx: &mut Context<'_>,
|
|
buf: &mut ReadBuf<'_>,
|
|
) -> Poll<io::Result<()>> {
|
|
AsyncRead::poll_read(Pin::new(&mut self.0), cx, buf)
|
|
}
|
|
}
|
|
|
|
impl AsyncWrite for DynTcpStream {
|
|
fn poll_write(
|
|
mut self: Pin<&mut Self>,
|
|
cx: &mut Context<'_>,
|
|
buf: &[u8],
|
|
) -> Poll<io::Result<usize>> {
|
|
AsyncWrite::poll_write(Pin::new(&mut self.0), cx, buf)
|
|
}
|
|
|
|
fn poll_flush(mut self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<io::Result<()>> {
|
|
AsyncWrite::poll_flush(Pin::new(&mut self.0), cx)
|
|
}
|
|
|
|
fn poll_shutdown(mut self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<io::Result<()>> {
|
|
AsyncWrite::poll_shutdown(Pin::new(&mut self.0), cx)
|
|
}
|
|
}
|
|
|
|
impl<R: AsyncRead + AsyncWrite + Unpin> TcpStreamTrait for R {}
|
|
|
|
impl Encrypt {
|
|
pub fn new(key: Key) -> Self {
|
|
Self(key, 0, 0)
|
|
}
|
|
|
|
pub fn dec(&mut self, bytes: &mut BytesMut) -> Result<(), Error> {
|
|
if bytes.len() <= 1 {
|
|
return Ok(());
|
|
}
|
|
self.2 += 1;
|
|
let nonce = FramedStream::get_nonce(self.2);
|
|
match secretbox::open(bytes, &nonce, &self.0) {
|
|
Ok(res) => {
|
|
bytes.clear();
|
|
bytes.put_slice(&res);
|
|
Ok(())
|
|
}
|
|
Err(()) => Err(Error::new(ErrorKind::Other, "decryption error")),
|
|
}
|
|
}
|
|
|
|
pub fn enc(&mut self, data: &[u8]) -> Vec<u8> {
|
|
self.1 += 1;
|
|
let nonce = FramedStream::get_nonce(self.1);
|
|
secretbox::seal(&data, &nonce, &self.0)
|
|
}
|
|
|
|
pub fn decode(
|
|
symmetric_data: &[u8],
|
|
their_pk_b: &[u8],
|
|
our_sk_b: &box_::SecretKey,
|
|
) -> ResultType<Key> {
|
|
if their_pk_b.len() != box_::PUBLICKEYBYTES {
|
|
anyhow::bail!("Handshake failed: pk length {}", their_pk_b.len());
|
|
}
|
|
let nonce = box_::Nonce([0u8; box_::NONCEBYTES]);
|
|
let mut pk_ = [0u8; box_::PUBLICKEYBYTES];
|
|
pk_[..].copy_from_slice(their_pk_b);
|
|
let their_pk_b = box_::PublicKey(pk_);
|
|
let symmetric_key = box_::open(symmetric_data, &nonce, &their_pk_b, &our_sk_b)
|
|
.map_err(|_| anyhow::anyhow!("Handshake failed: box decryption failure"))?;
|
|
if symmetric_key.len() != secretbox::KEYBYTES {
|
|
anyhow::bail!("Handshake failed: invalid secret key length from peer");
|
|
}
|
|
let mut key = [0u8; secretbox::KEYBYTES];
|
|
key[..].copy_from_slice(&symmetric_key);
|
|
Ok(Key(key))
|
|
}
|
|
}
|