* add http(s) proxy * Add front-end translation * fix ui description * For linux platform, add rustls support * fix: Fix the proxy address test function. * add: Added default prompts for agency agreement and some multi-language translations * add: Http proxy request client * fix: add async http proxy func and format the code * add: Preliminary support for flutter front-end calling rust back-end http request * Optimize HTTP calls * Optimize HTTP calls * fix: Optimize HTTP requests, refine translations, and fix dependencies * fix: Win and macOS compilation errors * fix: web platforms * fix: Optimize import * fix: Fix web platform issues * fix: Fix web platform issues * fix: update ci * fix: test ci * test: test CI * Revert "fix: update ci" This reverts commit 2e5f247b2ed0cc63a6f6f7bbaaffd0a1223712e5. * test: test CI * test: test CI * fix: fix lock file * fix: Optimize imports
		
			
				
	
	
		
			342 lines
		
	
	
		
			9.9 KiB
		
	
	
	
		
			Rust
		
	
	
	
	
	
			
		
		
	
	
			342 lines
		
	
	
		
			9.9 KiB
		
	
	
	
		
			Rust
		
	
	
	
	
	
| use crate::{bail, bytes_codec::BytesCodec, ResultType, config::Socks5Server, proxy::Proxy};
 | |
| use anyhow::Context as AnyhowCtx;
 | |
| use bytes::{BufMut, Bytes, BytesMut};
 | |
| use futures::{SinkExt, StreamExt};
 | |
| use protobuf::Message;
 | |
| use sodiumoxide::crypto::{
 | |
|     box_,
 | |
|     secretbox::{self, Key, Nonce},
 | |
| };
 | |
| use std::{
 | |
|     io::{self, Error, ErrorKind},
 | |
|     net::{IpAddr, Ipv4Addr, Ipv6Addr, SocketAddr},
 | |
|     ops::{Deref, DerefMut},
 | |
|     pin::Pin,
 | |
|     task::{Context, Poll},
 | |
| };
 | |
| use tokio::{
 | |
|     io::{AsyncRead, AsyncWrite, ReadBuf},
 | |
|     net::{lookup_host, TcpListener, TcpSocket, ToSocketAddrs},
 | |
| };
 | |
| use tokio_socks::IntoTargetAddr;
 | |
| use tokio_util::codec::Framed;
 | |
| 
 | |
| pub trait TcpStreamTrait: AsyncRead + AsyncWrite + Unpin {}
 | |
| pub struct DynTcpStream(pub(crate) Box<dyn TcpStreamTrait + Send + Sync>);
 | |
| 
 | |
| #[derive(Clone)]
 | |
| pub struct Encrypt(Key, u64, u64);
 | |
| 
 | |
| pub struct FramedStream(
 | |
|     pub(crate) Framed<DynTcpStream, BytesCodec>,
 | |
|     pub(crate) SocketAddr,
 | |
|     pub(crate) Option<Encrypt>,
 | |
|     pub(crate) u64,
 | |
| );
 | |
| 
 | |
| impl Deref for FramedStream {
 | |
|     type Target = Framed<DynTcpStream, BytesCodec>;
 | |
| 
 | |
|     fn deref(&self) -> &Self::Target {
 | |
|         &self.0
 | |
|     }
 | |
| }
 | |
| 
 | |
| impl DerefMut for FramedStream {
 | |
|     fn deref_mut(&mut self) -> &mut Self::Target {
 | |
|         &mut self.0
 | |
|     }
 | |
| }
 | |
| 
 | |
| impl Deref for DynTcpStream {
 | |
|     type Target = Box<dyn TcpStreamTrait + Send + Sync>;
 | |
| 
 | |
|     fn deref(&self) -> &Self::Target {
 | |
|         &self.0
 | |
|     }
 | |
| }
 | |
| 
 | |
| impl DerefMut for DynTcpStream {
 | |
|     fn deref_mut(&mut self) -> &mut Self::Target {
 | |
|         &mut self.0
 | |
|     }
 | |
| }
 | |
| 
 | |
| pub(crate) fn new_socket(addr: std::net::SocketAddr, reuse: bool) -> Result<TcpSocket, std::io::Error> {
 | |
|     let socket = match addr {
 | |
|         std::net::SocketAddr::V4(..) => TcpSocket::new_v4()?,
 | |
|         std::net::SocketAddr::V6(..) => TcpSocket::new_v6()?,
 | |
|     };
 | |
|     if reuse {
 | |
|         // windows has no reuse_port, but it's reuse_address
 | |
|         // almost equals to unix's reuse_port + reuse_address,
 | |
|         // though may introduce nondeterministic behavior
 | |
|         #[cfg(unix)]
 | |
|         socket.set_reuseport(true).ok();
 | |
|         socket.set_reuseaddr(true).ok();
 | |
|     }
 | |
|     socket.bind(addr)?;
 | |
|     Ok(socket)
 | |
| }
 | |
| 
 | |
| impl FramedStream {
 | |
|     pub async fn new<T: ToSocketAddrs + std::fmt::Display>(
 | |
|         remote_addr: T,
 | |
|         local_addr: Option<SocketAddr>,
 | |
|         ms_timeout: u64,
 | |
|     ) -> ResultType<Self> {
 | |
|         for remote_addr in lookup_host(&remote_addr).await? {
 | |
|             let local = if let Some(addr) = local_addr {
 | |
|                 addr
 | |
|             } else {
 | |
|                 crate::config::Config::get_any_listen_addr(remote_addr.is_ipv4())
 | |
|             };
 | |
|             if let Ok(socket) = new_socket(local, true) {
 | |
|                 if let Ok(Ok(stream)) =
 | |
|                     super::timeout(ms_timeout, socket.connect(remote_addr)).await
 | |
|                 {
 | |
|                     stream.set_nodelay(true).ok();
 | |
|                     let addr = stream.local_addr()?;
 | |
|                     return Ok(Self(
 | |
|                         Framed::new(DynTcpStream(Box::new(stream)), BytesCodec::new()),
 | |
|                         addr,
 | |
|                         None,
 | |
|                         0,
 | |
|                     ));
 | |
|                 }
 | |
|             }
 | |
|         }
 | |
|         bail!(format!("Failed to connect to {remote_addr}"));
 | |
|     }
 | |
| 
 | |
|     pub async fn connect<'t, T>(
 | |
|         target: T,
 | |
|         local_addr: Option<SocketAddr>,
 | |
|         proxy_conf: &Socks5Server,
 | |
|         ms_timeout: u64,
 | |
|     ) -> ResultType<Self>
 | |
|     where
 | |
|         T: IntoTargetAddr<'t>,
 | |
|     {
 | |
|         let proxy = Proxy::from_conf(proxy_conf, Some(ms_timeout))?;
 | |
|         proxy.connect::<T>(target, local_addr).await
 | |
|     }
 | |
| 
 | |
|     pub fn local_addr(&self) -> SocketAddr {
 | |
|         self.1
 | |
|     }
 | |
| 
 | |
|     pub fn set_send_timeout(&mut self, ms: u64) {
 | |
|         self.3 = ms;
 | |
|     }
 | |
| 
 | |
|     pub fn from(stream: impl TcpStreamTrait + Send + Sync + 'static, addr: SocketAddr) -> Self {
 | |
|         Self(
 | |
|             Framed::new(DynTcpStream(Box::new(stream)), BytesCodec::new()),
 | |
|             addr,
 | |
|             None,
 | |
|             0,
 | |
|         )
 | |
|     }
 | |
| 
 | |
|     pub fn set_raw(&mut self) {
 | |
|         self.0.codec_mut().set_raw();
 | |
|         self.2 = None;
 | |
|     }
 | |
| 
 | |
|     pub fn is_secured(&self) -> bool {
 | |
|         self.2.is_some()
 | |
|     }
 | |
| 
 | |
|     #[inline]
 | |
|     pub async fn send(&mut self, msg: &impl Message) -> ResultType<()> {
 | |
|         self.send_raw(msg.write_to_bytes()?).await
 | |
|     }
 | |
| 
 | |
|     #[inline]
 | |
|     pub async fn send_raw(&mut self, msg: Vec<u8>) -> ResultType<()> {
 | |
|         let mut msg = msg;
 | |
|         if let Some(key) = self.2.as_mut() {
 | |
|             msg = key.enc(&msg);
 | |
|         }
 | |
|         self.send_bytes(bytes::Bytes::from(msg)).await?;
 | |
|         Ok(())
 | |
|     }
 | |
| 
 | |
|     #[inline]
 | |
|     pub async fn send_bytes(&mut self, bytes: Bytes) -> ResultType<()> {
 | |
|         if self.3 > 0 {
 | |
|             super::timeout(self.3, self.0.send(bytes)).await??;
 | |
|         } else {
 | |
|             self.0.send(bytes).await?;
 | |
|         }
 | |
|         Ok(())
 | |
|     }
 | |
| 
 | |
|     #[inline]
 | |
|     pub async fn next(&mut self) -> Option<Result<BytesMut, Error>> {
 | |
|         let mut res = self.0.next().await;
 | |
|         if let Some(Ok(bytes)) = res.as_mut() {
 | |
|             if let Some(key) = self.2.as_mut() {
 | |
|                 if let Err(err) = key.dec(bytes) {
 | |
|                     return Some(Err(err));
 | |
|                 }
 | |
|             }
 | |
|         }
 | |
|         res
 | |
|     }
 | |
| 
 | |
|     #[inline]
 | |
|     pub async fn next_timeout(&mut self, ms: u64) -> Option<Result<BytesMut, Error>> {
 | |
|         if let Ok(res) = super::timeout(ms, self.next()).await {
 | |
|             res
 | |
|         } else {
 | |
|             None
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     pub fn set_key(&mut self, key: Key) {
 | |
|         self.2 = Some(Encrypt::new(key));
 | |
|     }
 | |
| 
 | |
|     fn get_nonce(seqnum: u64) -> Nonce {
 | |
|         let mut nonce = Nonce([0u8; secretbox::NONCEBYTES]);
 | |
|         nonce.0[..std::mem::size_of_val(&seqnum)].copy_from_slice(&seqnum.to_le_bytes());
 | |
|         nonce
 | |
|     }
 | |
| }
 | |
| 
 | |
| const DEFAULT_BACKLOG: u32 = 128;
 | |
| 
 | |
| pub async fn new_listener<T: ToSocketAddrs>(addr: T, reuse: bool) -> ResultType<TcpListener> {
 | |
|     if !reuse {
 | |
|         Ok(TcpListener::bind(addr).await?)
 | |
|     } else {
 | |
|         let addr = lookup_host(&addr)
 | |
|             .await?
 | |
|             .next()
 | |
|             .context("could not resolve to any address")?;
 | |
|         new_socket(addr, true)?
 | |
|             .listen(DEFAULT_BACKLOG)
 | |
|             .map_err(anyhow::Error::msg)
 | |
|     }
 | |
| }
 | |
| 
 | |
| pub async fn listen_any(port: u16) -> ResultType<TcpListener> {
 | |
|     if let Ok(mut socket) = TcpSocket::new_v6() {
 | |
|         #[cfg(unix)]
 | |
|         {
 | |
|             socket.set_reuseport(true).ok();
 | |
|             socket.set_reuseaddr(true).ok();
 | |
|             use std::os::unix::io::{FromRawFd, IntoRawFd};
 | |
|             let raw_fd = socket.into_raw_fd();
 | |
|             let sock2 = unsafe { socket2::Socket::from_raw_fd(raw_fd) };
 | |
|             sock2.set_only_v6(false).ok();
 | |
|             socket = unsafe { TcpSocket::from_raw_fd(sock2.into_raw_fd()) };
 | |
|         }
 | |
|         #[cfg(windows)]
 | |
|         {
 | |
|             use std::os::windows::prelude::{FromRawSocket, IntoRawSocket};
 | |
|             let raw_socket = socket.into_raw_socket();
 | |
|             let sock2 = unsafe { socket2::Socket::from_raw_socket(raw_socket) };
 | |
|             sock2.set_only_v6(false).ok();
 | |
|             socket = unsafe { TcpSocket::from_raw_socket(sock2.into_raw_socket()) };
 | |
|         }
 | |
|         if socket
 | |
|             .bind(SocketAddr::new(IpAddr::V6(Ipv6Addr::UNSPECIFIED), port))
 | |
|             .is_ok()
 | |
|         {
 | |
|             if let Ok(l) = socket.listen(DEFAULT_BACKLOG) {
 | |
|                 return Ok(l);
 | |
|             }
 | |
|         }
 | |
|     }
 | |
|     Ok(new_socket(
 | |
|         SocketAddr::new(IpAddr::V4(Ipv4Addr::UNSPECIFIED), port),
 | |
|         true,
 | |
|     )?
 | |
|     .listen(DEFAULT_BACKLOG)?)
 | |
| }
 | |
| 
 | |
| impl Unpin for DynTcpStream {}
 | |
| 
 | |
| impl AsyncRead for DynTcpStream {
 | |
|     fn poll_read(
 | |
|         mut self: Pin<&mut Self>,
 | |
|         cx: &mut Context<'_>,
 | |
|         buf: &mut ReadBuf<'_>,
 | |
|     ) -> Poll<io::Result<()>> {
 | |
|         AsyncRead::poll_read(Pin::new(&mut self.0), cx, buf)
 | |
|     }
 | |
| }
 | |
| 
 | |
| impl AsyncWrite for DynTcpStream {
 | |
|     fn poll_write(
 | |
|         mut self: Pin<&mut Self>,
 | |
|         cx: &mut Context<'_>,
 | |
|         buf: &[u8],
 | |
|     ) -> Poll<io::Result<usize>> {
 | |
|         AsyncWrite::poll_write(Pin::new(&mut self.0), cx, buf)
 | |
|     }
 | |
| 
 | |
|     fn poll_flush(mut self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<io::Result<()>> {
 | |
|         AsyncWrite::poll_flush(Pin::new(&mut self.0), cx)
 | |
|     }
 | |
| 
 | |
|     fn poll_shutdown(mut self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll<io::Result<()>> {
 | |
|         AsyncWrite::poll_shutdown(Pin::new(&mut self.0), cx)
 | |
|     }
 | |
| }
 | |
| 
 | |
| impl<R: AsyncRead + AsyncWrite + Unpin> TcpStreamTrait for R {}
 | |
| 
 | |
| impl Encrypt {
 | |
|     pub fn new(key: Key) -> Self {
 | |
|         Self(key, 0, 0)
 | |
|     }
 | |
| 
 | |
|     pub fn dec(&mut self, bytes: &mut BytesMut) -> Result<(), Error> {
 | |
|         if bytes.len() <= 1 {
 | |
|             return Ok(());
 | |
|         }
 | |
|         self.2 += 1;
 | |
|         let nonce = FramedStream::get_nonce(self.2);
 | |
|         match secretbox::open(bytes, &nonce, &self.0) {
 | |
|             Ok(res) => {
 | |
|                 bytes.clear();
 | |
|                 bytes.put_slice(&res);
 | |
|                 Ok(())
 | |
|             }
 | |
|             Err(()) => Err(Error::new(ErrorKind::Other, "decryption error")),
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     pub fn enc(&mut self, data: &[u8]) -> Vec<u8> {
 | |
|         self.1 += 1;
 | |
|         let nonce = FramedStream::get_nonce(self.1);
 | |
|         secretbox::seal(&data, &nonce, &self.0)
 | |
|     }
 | |
| 
 | |
|     pub fn decode(
 | |
|         symmetric_data: &[u8],
 | |
|         their_pk_b: &[u8],
 | |
|         our_sk_b: &box_::SecretKey,
 | |
|     ) -> ResultType<Key> {
 | |
|         if their_pk_b.len() != box_::PUBLICKEYBYTES {
 | |
|             anyhow::bail!("Handshake failed: pk length {}", their_pk_b.len());
 | |
|         }
 | |
|         let nonce = box_::Nonce([0u8; box_::NONCEBYTES]);
 | |
|         let mut pk_ = [0u8; box_::PUBLICKEYBYTES];
 | |
|         pk_[..].copy_from_slice(their_pk_b);
 | |
|         let their_pk_b = box_::PublicKey(pk_);
 | |
|         let symmetric_key = box_::open(symmetric_data, &nonce, &their_pk_b, &our_sk_b)
 | |
|             .map_err(|_| anyhow::anyhow!("Handshake failed: box decryption failure"))?;
 | |
|         if symmetric_key.len() != secretbox::KEYBYTES {
 | |
|             anyhow::bail!("Handshake failed: invalid secret key length from peer");
 | |
|         }
 | |
|         let mut key = [0u8; secretbox::KEYBYTES];
 | |
|         key[..].copy_from_slice(&symmetric_key);
 | |
|         Ok(Key(key))
 | |
|     }
 | |
| }
 |