You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
307 lines
8.5 KiB
307 lines
8.5 KiB
/*
|
|
* plugin.c - Manage plugins
|
|
*
|
|
* Copyright (C) 2013 - 2017, Max Lv <max.c.lv@gmail.com>
|
|
*
|
|
* This file is part of the shadowsocks-libev.
|
|
*
|
|
* shadowsocks-libev is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* shadowsocks-libev is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with shadowsocks-libev; see the file COPYING. If not, see
|
|
* <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include "config.h"
|
|
#endif
|
|
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/wait.h>
|
|
#include <netinet/in.h>
|
|
|
|
#include <libcork/core.h>
|
|
#include <libcork/os.h>
|
|
|
|
#include "utils.h"
|
|
#include "plugin.h"
|
|
|
|
#define CMD_RESRV_LEN 128
|
|
|
|
static int exit_code;
|
|
static struct cork_env *env = NULL;
|
|
static struct cork_exec *exec = NULL;
|
|
static struct cork_subprocess *sub = NULL;
|
|
|
|
static int
|
|
plugin_log__data(struct cork_stream_consumer *vself,
|
|
const void *buf, size_t size, bool is_first)
|
|
{
|
|
size_t bytes_written = fwrite(buf, 1, size, stderr);
|
|
/* If there was an error writing to the file, then signal this
|
|
* to the producer */
|
|
if (bytes_written == size) {
|
|
return 0;
|
|
} else {
|
|
cork_system_error_set();
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
static int
|
|
plugin_log__eof(struct cork_stream_consumer *vself)
|
|
{
|
|
/* We don't close the file, so there's nothing special to do at
|
|
* end-of-stream. */
|
|
return 0;
|
|
}
|
|
|
|
static void
|
|
plugin_log__free(struct cork_stream_consumer *vself)
|
|
{
|
|
return;
|
|
}
|
|
|
|
struct cork_stream_consumer plugin_log = {
|
|
.data = plugin_log__data,
|
|
.eof = plugin_log__eof,
|
|
.free = plugin_log__free,
|
|
};
|
|
|
|
static int start_ss_plugin(const char *plugin,
|
|
const char *plugin_opts,
|
|
const char *remote_host,
|
|
const char *remote_port,
|
|
const char *local_host,
|
|
const char *local_port,
|
|
enum plugin_mode mode)
|
|
{
|
|
char *new_path = NULL;
|
|
char *cmd = NULL;
|
|
|
|
size_t plugin_len = strlen(plugin);
|
|
size_t cmd_len = plugin_len + CMD_RESRV_LEN;
|
|
cmd = ss_malloc(cmd_len);
|
|
|
|
snprintf(cmd, cmd_len, "exec %s", plugin);
|
|
|
|
cork_env_add(env, "SS_REMOTE_HOST", remote_host);
|
|
cork_env_add(env, "SS_REMOTE_PORT", remote_port);
|
|
|
|
cork_env_add(env, "SS_LOCAL_HOST", local_host);
|
|
cork_env_add(env, "SS_LOCAL_PORT", local_port);
|
|
|
|
if (plugin_opts != NULL)
|
|
cork_env_add(env, "SS_PLUGIN_OPTIONS", plugin_opts);
|
|
|
|
exec = cork_exec_new_with_params("sh", "-c", cmd, NULL);
|
|
|
|
cork_exec_set_env(exec, env);
|
|
|
|
sub = cork_subprocess_new_exec(exec, NULL, NULL, &exit_code);
|
|
|
|
int err = cork_subprocess_start(sub);
|
|
|
|
ss_free(cmd);
|
|
|
|
if (new_path != NULL)
|
|
ss_free(new_path);
|
|
|
|
return err;
|
|
}
|
|
|
|
#define OBFSPROXY_OPTS_MAX 4096
|
|
/*
|
|
* For obfsproxy, we use standalone mode for now.
|
|
* Managed mode needs to use SOCKS5 proxy as forwarder, which is not supported
|
|
* yet.
|
|
*
|
|
* The idea of using standalone mode is quite simple, just assemble the
|
|
* internal port into obfsproxy parameters.
|
|
*
|
|
* Using manually ran scramblesuit as an example:
|
|
* obfsproxy \
|
|
* --data-dir /tmp/ss_libev_plugin_with_suffix \
|
|
* scramblesuit \
|
|
* --password SOMEMEANINGLESSPASSWORDASEXAMPLE \
|
|
* --dest some.server.org:12345 \
|
|
* client \
|
|
* 127.0.0.1:54321
|
|
*
|
|
* In above case, @plugin = "obfsproxy",
|
|
* @plugin_opts = "scramblesuit --password SOMEMEANINGLESSPASSWORDASEXAMPLE"
|
|
* For obfs3, it's even easier, just pass @plugin = "obfsproxy"
|
|
* @plugin_opts = "obfs3"
|
|
*
|
|
* And the rest parameters are all assembled here.
|
|
* Some old obfsproxy will not be supported as it doesn't even support
|
|
* "--data-dir" option
|
|
*/
|
|
static int start_obfsproxy(const char *plugin,
|
|
const char *plugin_opts,
|
|
const char *remote_host,
|
|
const char *remote_port,
|
|
const char *local_host,
|
|
const char *local_port,
|
|
enum plugin_mode mode)
|
|
{
|
|
char *pch;
|
|
char *opts_dump;
|
|
char *buf = NULL;
|
|
int ret, buf_size = 0;
|
|
|
|
opts_dump = strndup(plugin_opts, OBFSPROXY_OPTS_MAX);
|
|
if (!opts_dump) {
|
|
ERROR("start_obfsproxy strndup failed");
|
|
return -ENOMEM;
|
|
}
|
|
exec = cork_exec_new(plugin);
|
|
|
|
/* The first parameter will be skipped, so pass @plugin again */
|
|
cork_exec_add_param(exec, plugin);
|
|
|
|
cork_exec_add_param(exec, "--data-dir");
|
|
buf_size = 20 + strlen(plugin) + strlen(remote_host)
|
|
+ strlen(remote_port) + strlen(local_host) + strlen(local_port);
|
|
buf = malloc(buf_size);
|
|
snprintf(buf, buf_size, "/tmp/%s_%s:%s_%s:%s", plugin,
|
|
remote_host, remote_port, local_host, local_port);
|
|
cork_exec_add_param(exec, buf);
|
|
|
|
/*
|
|
* Iterate @plugin_opts by space
|
|
*/
|
|
pch = strtok(opts_dump, " ");
|
|
while (pch) {
|
|
cork_exec_add_param(exec, pch);
|
|
pch = strtok(NULL, " ");
|
|
}
|
|
|
|
/* The rest options */
|
|
if (mode == MODE_CLIENT) {
|
|
/* Client mode */
|
|
cork_exec_add_param(exec, "--dest");
|
|
snprintf(buf, buf_size, "%s:%s", remote_host, remote_port);
|
|
cork_exec_add_param(exec, buf);
|
|
cork_exec_add_param(exec, "client");
|
|
snprintf(buf, buf_size, "%s:%s", local_host, local_port);
|
|
cork_exec_add_param(exec, buf);
|
|
} else {
|
|
/* Server mode */
|
|
cork_exec_add_param(exec, "--dest");
|
|
snprintf(buf, buf_size, "%s:%s", local_host, local_port);
|
|
cork_exec_add_param(exec, buf);
|
|
cork_exec_add_param(exec, "server");
|
|
snprintf(buf, buf_size, "%s:%s", remote_host, remote_port);
|
|
cork_exec_add_param(exec, buf);
|
|
}
|
|
cork_exec_set_env(exec, env);
|
|
sub = cork_subprocess_new_exec(exec, NULL, NULL, &exit_code);
|
|
ret = cork_subprocess_start(sub);
|
|
ss_free(opts_dump);
|
|
free(buf);
|
|
return ret;
|
|
}
|
|
|
|
int
|
|
start_plugin(const char *plugin,
|
|
const char *plugin_opts,
|
|
const char *remote_host,
|
|
const char *remote_port,
|
|
const char *local_host,
|
|
const char *local_port,
|
|
enum plugin_mode mode)
|
|
{
|
|
char *new_path = NULL;
|
|
const char *current_path;
|
|
size_t new_path_len;
|
|
int ret;
|
|
|
|
if (plugin == NULL)
|
|
return -1;
|
|
|
|
if (strlen(plugin) == 0)
|
|
return 0;
|
|
|
|
/*
|
|
* Add current dir to PATH, so we can search plugin in current dir
|
|
*/
|
|
env = cork_env_clone_current();
|
|
current_path = cork_env_get(env, "PATH");
|
|
if (current_path != NULL) {
|
|
char *cwd = get_current_dir_name();
|
|
if (cwd) {
|
|
new_path_len = strlen(current_path) + strlen(cwd) + 2;
|
|
new_path = ss_malloc(new_path_len);
|
|
snprintf(new_path, new_path_len, "%s:%s", cwd, current_path);
|
|
free(cwd);
|
|
}
|
|
}
|
|
if (new_path != NULL)
|
|
cork_env_add(env, "PATH", new_path);
|
|
|
|
if (!strncmp(plugin, "obfsproxy", strlen("obfsproxy")))
|
|
ret = start_obfsproxy(plugin, plugin_opts, remote_host, remote_port,
|
|
local_host, local_port, mode);
|
|
else
|
|
ret = start_ss_plugin(plugin, plugin_opts, remote_host, remote_port,
|
|
local_host, local_port, mode);
|
|
ss_free(new_path);
|
|
env = NULL;
|
|
return ret;
|
|
}
|
|
|
|
uint16_t
|
|
get_local_port()
|
|
{
|
|
int sock = socket(AF_INET, SOCK_STREAM, 0);
|
|
if (sock < 0) {
|
|
return 0;
|
|
}
|
|
|
|
struct sockaddr_in serv_addr;
|
|
bzero((char *) &serv_addr, sizeof(serv_addr));
|
|
serv_addr.sin_family = AF_INET;
|
|
serv_addr.sin_addr.s_addr = INADDR_ANY;
|
|
serv_addr.sin_port = 0;
|
|
if (bind(sock, (struct sockaddr *) &serv_addr, sizeof(serv_addr)) < 0) {
|
|
return 0;
|
|
}
|
|
|
|
socklen_t len = sizeof(serv_addr);
|
|
if (getsockname(sock, (struct sockaddr *)&serv_addr, &len) == -1) {
|
|
return 0;
|
|
}
|
|
if (close (sock) < 0) {
|
|
return 0;
|
|
}
|
|
|
|
return ntohs(serv_addr.sin_port);
|
|
}
|
|
|
|
void
|
|
stop_plugin()
|
|
{
|
|
if (sub != NULL) {
|
|
cork_subprocess_abort(sub);
|
|
cork_subprocess_free(sub);
|
|
}
|
|
}
|
|
|
|
int is_plugin_running()
|
|
{
|
|
if (sub != NULL) {
|
|
return cork_subprocess_is_finished(sub);
|
|
}
|
|
return 0;
|
|
}
|