onhu commited on
Commit
e0d48dd
1 Parent(s): e680af8

Create dist/apps/node-vless/main.js

Browse files
Files changed (1) hide show
  1. dist/apps/node-vless/main.js +630 -0
dist/apps/node-vless/main.js ADDED
@@ -0,0 +1,630 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ // <!--GAMFC-->version base on commit 43fad05dcdae3b723c53c226f8181fc5bd47223e, time is 2023-06-22 15:20:02 UTC<!--GAMFC-END-->.
2
+ // @ts-ignore
3
+ import { connect } from 'cloudflare:sockets';
4
+
5
+ // How to generate your own UUID:
6
+ // [Windows] Press "Win + R", input cmd and run: Powershell -NoExit -Command "[guid]::NewGuid()"
7
+ let userID = 'd342d11e-d424-4583-b36e-524ab1f0afa4';
8
+
9
+ let proxyIP = '';
10
+
11
+
12
+ if (!isValidUUID(userID)) {
13
+ throw new Error('uuid is not valid');
14
+ }
15
+
16
+ export default {
17
+ /**
18
+ * @param {import("@cloudflare/workers-types").Request} request
19
+ * @param {{UUID: string, PROXYIP: string}} env
20
+ * @param {import("@cloudflare/workers-types").ExecutionContext} ctx
21
+ * @returns {Promise<Response>}
22
+ */
23
+ async fetch(request, env, ctx) {
24
+ try {
25
+ userID = env.UUID || userID;
26
+ proxyIP = env.PROXYIP || proxyIP;
27
+ const upgradeHeader = request.headers.get('Upgrade');
28
+ if (!upgradeHeader || upgradeHeader !== 'websocket') {
29
+ const url = new URL(request.url);
30
+ switch (url.pathname) {
31
+ case '/':
32
+ return new Response(JSON.stringify(request.cf), { status: 200 });
33
+ case `/${userID}`: {
34
+ const vlessConfig = getVLESSConfig(userID, request.headers.get('Host'));
35
+ return new Response(`${vlessConfig}`, {
36
+ status: 200,
37
+ headers: {
38
+ "Content-Type": "text/plain;charset=utf-8",
39
+ }
40
+ });
41
+ }
42
+ default:
43
+ return new Response('Not found', { status: 404 });
44
+ }
45
+ } else {
46
+ return await vlessOverWSHandler(request);
47
+ }
48
+ } catch (err) {
49
+ /** @type {Error} */ let e = err;
50
+ return new Response(e.toString());
51
+ }
52
+ },
53
+ };
54
+
55
+
56
+
57
+
58
+ /**
59
+ *
60
+ * @param {import("@cloudflare/workers-types").Request} request
61
+ */
62
+ async function vlessOverWSHandler(request) {
63
+
64
+ /** @type {import("@cloudflare/workers-types").WebSocket[]} */
65
+ // @ts-ignore
66
+ const webSocketPair = new WebSocketPair();
67
+ const [client, webSocket] = Object.values(webSocketPair);
68
+
69
+ webSocket.accept();
70
+
71
+ let address = '';
72
+ let portWithRandomLog = '';
73
+ const log = (/** @type {string} */ info, /** @type {string | undefined} */ event) => {
74
+ console.log(`[${address}:${portWithRandomLog}] ${info}`, event || '');
75
+ };
76
+ const earlyDataHeader = request.headers.get('sec-websocket-protocol') || '';
77
+
78
+ const readableWebSocketStream = makeReadableWebSocketStream(webSocket, earlyDataHeader, log);
79
+
80
+ /** @type {{ value: import("@cloudflare/workers-types").Socket | null}}*/
81
+ let remoteSocketWapper = {
82
+ value: null,
83
+ };
84
+ let udpStreamWrite = null;
85
+ let isDns = false;
86
+
87
+ // ws --> remote
88
+ readableWebSocketStream.pipeTo(new WritableStream({
89
+ async write(chunk, controller) {
90
+ if (isDns && udpStreamWrite) {
91
+ return udpStreamWrite(chunk);
92
+ }
93
+ if (remoteSocketWapper.value) {
94
+ const writer = remoteSocketWapper.value.writable.getWriter()
95
+ await writer.write(chunk);
96
+ writer.releaseLock();
97
+ return;
98
+ }
99
+
100
+ const {
101
+ hasError,
102
+ message,
103
+ portRemote = 443,
104
+ addressRemote = '',
105
+ rawDataIndex,
106
+ vlessVersion = new Uint8Array([0, 0]),
107
+ isUDP,
108
+ } = processVlessHeader(chunk, userID);
109
+ address = addressRemote;
110
+ portWithRandomLog = `${portRemote}--${Math.random()} ${isUDP ? 'udp ' : 'tcp '
111
+ } `;
112
+ if (hasError) {
113
+ // controller.error(message);
114
+ throw new Error(message); // cf seems has bug, controller.error will not end stream
115
+ // webSocket.close(1000, message);
116
+ return;
117
+ }
118
+ // if UDP but port not DNS port, close it
119
+ if (isUDP) {
120
+ if (portRemote === 53) {
121
+ isDns = true;
122
+ } else {
123
+ // controller.error('UDP proxy only enable for DNS which is port 53');
124
+ throw new Error('UDP proxy only enable for DNS which is port 53'); // cf seems has bug, controller.error will not end stream
125
+ return;
126
+ }
127
+ }
128
+ // ["version", "附加信息长度 N"]
129
+ const vlessResponseHeader = new Uint8Array([vlessVersion[0], 0]);
130
+ const rawClientData = chunk.slice(rawDataIndex);
131
+
132
+ // TODO: support udp here when cf runtime has udp support
133
+ if (isDns) {
134
+ const { write } = await handleUDPOutBound(webSocket, vlessResponseHeader, log);
135
+ udpStreamWrite = write;
136
+ udpStreamWrite(rawClientData);
137
+ return;
138
+ }
139
+ handleTCPOutBound(remoteSocketWapper, addressRemote, portRemote, rawClientData, webSocket, vlessResponseHeader, log);
140
+ },
141
+ close() {
142
+ log(`readableWebSocketStream is close`);
143
+ },
144
+ abort(reason) {
145
+ log(`readableWebSocketStream is abort`, JSON.stringify(reason));
146
+ },
147
+ })).catch((err) => {
148
+ log('readableWebSocketStream pipeTo error', err);
149
+ });
150
+
151
+ return new Response(null, {
152
+ status: 101,
153
+ // @ts-ignore
154
+ webSocket: client,
155
+ });
156
+ }
157
+
158
+ /**
159
+ * Handles outbound TCP connections.
160
+ *
161
+ * @param {any} remoteSocket
162
+ * @param {string} addressRemote The remote address to connect to.
163
+ * @param {number} portRemote The remote port to connect to.
164
+ * @param {Uint8Array} rawClientData The raw client data to write.
165
+ * @param {import("@cloudflare/workers-types").WebSocket} webSocket The WebSocket to pass the remote socket to.
166
+ * @param {Uint8Array} vlessResponseHeader The VLESS response header.
167
+ * @param {function} log The logging function.
168
+ * @returns {Promise<void>} The remote socket.
169
+ */
170
+ async function handleTCPOutBound(remoteSocket, addressRemote, portRemote, rawClientData, webSocket, vlessResponseHeader, log,) {
171
+ async function connectAndWrite(address, port) {
172
+ /** @type {import("@cloudflare/workers-types").Socket} */
173
+ const tcpSocket = connect({
174
+ hostname: address,
175
+ port: port,
176
+ });
177
+ remoteSocket.value = tcpSocket;
178
+ log(`connected to ${address}:${port}`);
179
+ const writer = tcpSocket.writable.getWriter();
180
+ await writer.write(rawClientData); // first write, nomal is tls client hello
181
+ writer.releaseLock();
182
+ return tcpSocket;
183
+ }
184
+
185
+ // if the cf connect tcp socket have no incoming data, we retry to redirect ip
186
+ async function retry() {
187
+ const tcpSocket = await connectAndWrite(proxyIP || addressRemote, portRemote)
188
+ // no matter retry success or not, close websocket
189
+ tcpSocket.closed.catch(error => {
190
+ console.log('retry tcpSocket closed error', error);
191
+ }).finally(() => {
192
+ safeCloseWebSocket(webSocket);
193
+ })
194
+ remoteSocketToWS(tcpSocket, webSocket, vlessResponseHeader, null, log);
195
+ }
196
+
197
+ const tcpSocket = await connectAndWrite(addressRemote, portRemote);
198
+
199
+ // when remoteSocket is ready, pass to websocket
200
+ // remote--> ws
201
+ remoteSocketToWS(tcpSocket, webSocket, vlessResponseHeader, retry, log);
202
+ }
203
+
204
+ /**
205
+ *
206
+ * @param {import("@cloudflare/workers-types").WebSocket} webSocketServer
207
+ * @param {string} earlyDataHeader for ws 0rtt
208
+ * @param {(info: string)=> void} log for ws 0rtt
209
+ */
210
+ function makeReadableWebSocketStream(webSocketServer, earlyDataHeader, log) {
211
+ let readableStreamCancel = false;
212
+ const stream = new ReadableStream({
213
+ start(controller) {
214
+ webSocketServer.addEventListener('message', (event) => {
215
+ if (readableStreamCancel) {
216
+ return;
217
+ }
218
+ const message = event.data;
219
+ controller.enqueue(message);
220
+ });
221
+
222
+ // The event means that the client closed the client -> server stream.
223
+ // However, the server -> client stream is still open until you call close() on the server side.
224
+ // The WebSocket protocol says that a separate close message must be sent in each direction to fully close the socket.
225
+ webSocketServer.addEventListener('close', () => {
226
+ // client send close, need close server
227
+ // if stream is cancel, skip controller.close
228
+ safeCloseWebSocket(webSocketServer);
229
+ if (readableStreamCancel) {
230
+ return;
231
+ }
232
+ controller.close();
233
+ }
234
+ );
235
+ webSocketServer.addEventListener('error', (err) => {
236
+ log('webSocketServer has error');
237
+ controller.error(err);
238
+ }
239
+ );
240
+ // for ws 0rtt
241
+ const { earlyData, error } = base64ToArrayBuffer(earlyDataHeader);
242
+ if (error) {
243
+ controller.error(error);
244
+ } else if (earlyData) {
245
+ controller.enqueue(earlyData);
246
+ }
247
+ },
248
+
249
+ pull(controller) {
250
+ // if ws can stop read if stream is full, we can implement backpressure
251
+ // https://streams.spec.whatwg.org/#example-rs-push-backpressure
252
+ },
253
+ cancel(reason) {
254
+ // 1. pipe WritableStream has error, this cancel will called, so ws handle server close into here
255
+ // 2. if readableStream is cancel, all controller.close/enqueue need skip,
256
+ // 3. but from testing controller.error still work even if readableStream is cancel
257
+ if (readableStreamCancel) {
258
+ return;
259
+ }
260
+ log(`ReadableStream was canceled, due to ${reason}`)
261
+ readableStreamCancel = true;
262
+ safeCloseWebSocket(webSocketServer);
263
+ }
264
+ });
265
+
266
+ return stream;
267
+
268
+ }
269
+
270
+ // https://xtls.github.io/development/protocols/vless.html
271
+ // https://github.com/zizifn/excalidraw-backup/blob/main/v2ray-protocol.excalidraw
272
+
273
+ /**
274
+ *
275
+ * @param { ArrayBuffer} vlessBuffer
276
+ * @param {string} userID
277
+ * @returns
278
+ */
279
+ function processVlessHeader(
280
+ vlessBuffer,
281
+ userID
282
+ ) {
283
+ if (vlessBuffer.byteLength < 24) {
284
+ return {
285
+ hasError: true,
286
+ message: 'invalid data',
287
+ };
288
+ }
289
+ const version = new Uint8Array(vlessBuffer.slice(0, 1));
290
+ let isValidUser = false;
291
+ let isUDP = false;
292
+ if (stringify(new Uint8Array(vlessBuffer.slice(1, 17))) === userID) {
293
+ isValidUser = true;
294
+ }
295
+ if (!isValidUser) {
296
+ return {
297
+ hasError: true,
298
+ message: 'invalid user',
299
+ };
300
+ }
301
+
302
+ const optLength = new Uint8Array(vlessBuffer.slice(17, 18))[0];
303
+ //skip opt for now
304
+
305
+ const command = new Uint8Array(
306
+ vlessBuffer.slice(18 + optLength, 18 + optLength + 1)
307
+ )[0];
308
+
309
+ // 0x01 TCP
310
+ // 0x02 UDP
311
+ // 0x03 MUX
312
+ if (command === 1) {
313
+ } else if (command === 2) {
314
+ isUDP = true;
315
+ } else {
316
+ return {
317
+ hasError: true,
318
+ message: `command ${command} is not support, command 01-tcp,02-udp,03-mux`,
319
+ };
320
+ }
321
+ const portIndex = 18 + optLength + 1;
322
+ const portBuffer = vlessBuffer.slice(portIndex, portIndex + 2);
323
+ // port is big-Endian in raw data etc 80 == 0x005d
324
+ const portRemote = new DataView(portBuffer).getUint16(0);
325
+
326
+ let addressIndex = portIndex + 2;
327
+ const addressBuffer = new Uint8Array(
328
+ vlessBuffer.slice(addressIndex, addressIndex + 1)
329
+ );
330
+
331
+ // 1--> ipv4 addressLength =4
332
+ // 2--> domain name addressLength=addressBuffer[1]
333
+ // 3--> ipv6 addressLength =16
334
+ const addressType = addressBuffer[0];
335
+ let addressLength = 0;
336
+ let addressValueIndex = addressIndex + 1;
337
+ let addressValue = '';
338
+ switch (addressType) {
339
+ case 1:
340
+ addressLength = 4;
341
+ addressValue = new Uint8Array(
342
+ vlessBuffer.slice(addressValueIndex, addressValueIndex + addressLength)
343
+ ).join('.');
344
+ break;
345
+ case 2:
346
+ addressLength = new Uint8Array(
347
+ vlessBuffer.slice(addressValueIndex, addressValueIndex + 1)
348
+ )[0];
349
+ addressValueIndex += 1;
350
+ addressValue = new TextDecoder().decode(
351
+ vlessBuffer.slice(addressValueIndex, addressValueIndex + addressLength)
352
+ );
353
+ break;
354
+ case 3:
355
+ addressLength = 16;
356
+ const dataView = new DataView(
357
+ vlessBuffer.slice(addressValueIndex, addressValueIndex + addressLength)
358
+ );
359
+ // 2001:0db8:85a3:0000:0000:8a2e:0370:7334
360
+ const ipv6 = [];
361
+ for (let i = 0; i < 8; i++) {
362
+ ipv6.push(dataView.getUint16(i * 2).toString(16));
363
+ }
364
+ addressValue = ipv6.join(':');
365
+ // seems no need add [] for ipv6
366
+ break;
367
+ default:
368
+ return {
369
+ hasError: true,
370
+ message: `invild addressType is ${addressType}`,
371
+ };
372
+ }
373
+ if (!addressValue) {
374
+ return {
375
+ hasError: true,
376
+ message: `addressValue is empty, addressType is ${addressType}`,
377
+ };
378
+ }
379
+
380
+ return {
381
+ hasError: false,
382
+ addressRemote: addressValue,
383
+ addressType,
384
+ portRemote,
385
+ rawDataIndex: addressValueIndex + addressLength,
386
+ vlessVersion: version,
387
+ isUDP,
388
+ };
389
+ }
390
+
391
+
392
+ /**
393
+ *
394
+ * @param {import("@cloudflare/workers-types").Socket} remoteSocket
395
+ * @param {import("@cloudflare/workers-types").WebSocket} webSocket
396
+ * @param {ArrayBuffer} vlessResponseHeader
397
+ * @param {(() => Promise<void>) | null} retry
398
+ * @param {*} log
399
+ */
400
+ async function remoteSocketToWS(remoteSocket, webSocket, vlessResponseHeader, retry, log) {
401
+ // remote--> ws
402
+ let remoteChunkCount = 0;
403
+ let chunks = [];
404
+ /** @type {ArrayBuffer | null} */
405
+ let vlessHeader = vlessResponseHeader;
406
+ let hasIncomingData = false; // check if remoteSocket has incoming data
407
+ await remoteSocket.readable
408
+ .pipeTo(
409
+ new WritableStream({
410
+ start() {
411
+ },
412
+ /**
413
+ *
414
+ * @param {Uint8Array} chunk
415
+ * @param {*} controller
416
+ */
417
+ async write(chunk, controller) {
418
+ hasIncomingData = true;
419
+ // remoteChunkCount++;
420
+ if (webSocket.readyState !== WS_READY_STATE_OPEN) {
421
+ controller.error(
422
+ 'webSocket.readyState is not open, maybe close'
423
+ );
424
+ }
425
+ if (vlessHeader) {
426
+ webSocket.send(await new Blob([vlessHeader, chunk]).arrayBuffer());
427
+ vlessHeader = null;
428
+ } else {
429
+ // seems no need rate limit this, CF seems fix this??..
430
+ // if (remoteChunkCount > 20000) {
431
+ // // cf one package is 4096 byte(4kb), 4096 * 20000 = 80M
432
+ // await delay(1);
433
+ // }
434
+ webSocket.send(chunk);
435
+ }
436
+ },
437
+ close() {
438
+ log(`remoteConnection!.readable is close with hasIncomingData is ${hasIncomingData}`);
439
+ // safeCloseWebSocket(webSocket); // no need server close websocket frist for some case will casue HTTP ERR_CONTENT_LENGTH_MISMATCH issue, client will send close event anyway.
440
+ },
441
+ abort(reason) {
442
+ console.error(`remoteConnection!.readable abort`, reason);
443
+ },
444
+ })
445
+ )
446
+ .catch((error) => {
447
+ console.error(
448
+ `remoteSocketToWS has exception `,
449
+ error.stack || error
450
+ );
451
+ safeCloseWebSocket(webSocket);
452
+ });
453
+
454
+ // seems is cf connect socket have error,
455
+ // 1. Socket.closed will have error
456
+ // 2. Socket.readable will be close without any data coming
457
+ if (hasIncomingData === false && retry) {
458
+ log(`retry`)
459
+ retry();
460
+ }
461
+ }
462
+
463
+ /**
464
+ *
465
+ * @param {string} base64Str
466
+ * @returns
467
+ */
468
+ function base64ToArrayBuffer(base64Str) {
469
+ if (!base64Str) {
470
+ return { error: null };
471
+ }
472
+ try {
473
+ // go use modified Base64 for URL rfc4648 which js atob not support
474
+ base64Str = base64Str.replace(/-/g, '+').replace(/_/g, '/');
475
+ const decode = atob(base64Str);
476
+ const arryBuffer = Uint8Array.from(decode, (c) => c.charCodeAt(0));
477
+ return { earlyData: arryBuffer.buffer, error: null };
478
+ } catch (error) {
479
+ return { error };
480
+ }
481
+ }
482
+
483
+ /**
484
+ * This is not real UUID validation
485
+ * @param {string} uuid
486
+ */
487
+ function isValidUUID(uuid) {
488
+ const uuidRegex = /^[0-9a-f]{8}-[0-9a-f]{4}-[4][0-9a-f]{3}-[89ab][0-9a-f]{3}-[0-9a-f]{12}$/i;
489
+ return uuidRegex.test(uuid);
490
+ }
491
+
492
+ const WS_READY_STATE_OPEN = 1;
493
+ const WS_READY_STATE_CLOSING = 2;
494
+ /**
495
+ * Normally, WebSocket will not has exceptions when close.
496
+ * @param {import("@cloudflare/workers-types").WebSocket} socket
497
+ */
498
+ function safeCloseWebSocket(socket) {
499
+ try {
500
+ if (socket.readyState === WS_READY_STATE_OPEN || socket.readyState === WS_READY_STATE_CLOSING) {
501
+ socket.close();
502
+ }
503
+ } catch (error) {
504
+ console.error('safeCloseWebSocket error', error);
505
+ }
506
+ }
507
+
508
+ const byteToHex = [];
509
+ for (let i = 0; i < 256; ++i) {
510
+ byteToHex.push((i + 256).toString(16).slice(1));
511
+ }
512
+ function unsafeStringify(arr, offset = 0) {
513
+ return (byteToHex[arr[offset + 0]] + byteToHex[arr[offset + 1]] + byteToHex[arr[offset + 2]] + byteToHex[arr[offset + 3]] + "-" + byteToHex[arr[offset + 4]] + byteToHex[arr[offset + 5]] + "-" + byteToHex[arr[offset + 6]] + byteToHex[arr[offset + 7]] + "-" + byteToHex[arr[offset + 8]] + byteToHex[arr[offset + 9]] + "-" + byteToHex[arr[offset + 10]] + byteToHex[arr[offset + 11]] + byteToHex[arr[offset + 12]] + byteToHex[arr[offset + 13]] + byteToHex[arr[offset + 14]] + byteToHex[arr[offset + 15]]).toLowerCase();
514
+ }
515
+ function stringify(arr, offset = 0) {
516
+ const uuid = unsafeStringify(arr, offset);
517
+ if (!isValidUUID(uuid)) {
518
+ throw TypeError("Stringified UUID is invalid");
519
+ }
520
+ return uuid;
521
+ }
522
+
523
+
524
+ /**
525
+ *
526
+ * @param {import("@cloudflare/workers-types").WebSocket} webSocket
527
+ * @param {ArrayBuffer} vlessResponseHeader
528
+ * @param {(string)=> void} log
529
+ */
530
+ async function handleUDPOutBound(webSocket, vlessResponseHeader, log) {
531
+
532
+ let isVlessHeaderSent = false;
533
+ const transformStream = new TransformStream({
534
+ start(controller) {
535
+
536
+ },
537
+ transform(chunk, controller) {
538
+ // udp message 2 byte is the the length of udp data
539
+ // TODO: this should have bug, beacsue maybe udp chunk can be in two websocket message
540
+ for (let index = 0; index < chunk.byteLength;) {
541
+ const lengthBuffer = chunk.slice(index, index + 2);
542
+ const udpPakcetLength = new DataView(lengthBuffer).getUint16(0);
543
+ const udpData = new Uint8Array(
544
+ chunk.slice(index + 2, index + 2 + udpPakcetLength)
545
+ );
546
+ index = index + 2 + udpPakcetLength;
547
+ controller.enqueue(udpData);
548
+ }
549
+ },
550
+ flush(controller) {
551
+ }
552
+ });
553
+
554
+ // only handle dns udp for now
555
+ transformStream.readable.pipeTo(new WritableStream({
556
+ async write(chunk) {
557
+ const resp = await fetch('https://1.1.1.1/dns-query',
558
+ {
559
+ method: 'POST',
560
+ headers: {
561
+ 'content-type': 'application/dns-message',
562
+ },
563
+ body: chunk,
564
+ })
565
+ const dnsQueryResult = await resp.arrayBuffer();
566
+ const udpSize = dnsQueryResult.byteLength;
567
+ // console.log([...new Uint8Array(dnsQueryResult)].map((x) => x.toString(16)));
568
+ const udpSizeBuffer = new Uint8Array([(udpSize >> 8) & 0xff, udpSize & 0xff]);
569
+ if (webSocket.readyState === WS_READY_STATE_OPEN) {
570
+ log(`doh success and dns message length is ${udpSize}`);
571
+ if (isVlessHeaderSent) {
572
+ webSocket.send(await new Blob([udpSizeBuffer, dnsQueryResult]).arrayBuffer());
573
+ } else {
574
+ webSocket.send(await new Blob([vlessResponseHeader, udpSizeBuffer, dnsQueryResult]).arrayBuffer());
575
+ isVlessHeaderSent = true;
576
+ }
577
+ }
578
+ }
579
+ })).catch((error) => {
580
+ log('dns udp has error' + error)
581
+ });
582
+
583
+ const writer = transformStream.writable.getWriter();
584
+
585
+ return {
586
+ /**
587
+ *
588
+ * @param {Uint8Array} chunk
589
+ */
590
+ write(chunk) {
591
+ writer.write(chunk);
592
+ }
593
+ };
594
+ }
595
+
596
+ /**
597
+ *
598
+ * @param {string} userID
599
+ * @param {string | null} hostName
600
+ * @returns {string}
601
+ */
602
+ function getVLESSConfig(userID, hostName) {
603
+ const vlessMain = `vless://${userID}@${hostName}:443?encryption=none&security=tls&sni=${hostName}&fp=randomized&type=ws&host=${hostName}&path=%2F%3Fed%3D2048#${hostName}`
604
+ return `
605
+ ################################################################
606
+ v2ray
607
+ ---------------------------------------------------------------
608
+ ${vlessMain}
609
+ ---------------------------------------------------------------
610
+ ################################################################
611
+ clash-meta
612
+ ---------------------------------------------------------------
613
+ - type: vless
614
+ name: ${hostName}
615
+ server: ${hostName}
616
+ port: 443
617
+ uuid: ${userID}
618
+ network: ws
619
+ tls: true
620
+ udp: false
621
+ sni: ${hostName}
622
+ client-fingerprint: chrome
623
+ ws-opts:
624
+ path: "/?ed=2048"
625
+ headers:
626
+ host: ${hostName}
627
+ ---------------------------------------------------------------
628
+ ################################################################
629
+ `;
630
+ }