prox5/mystery_dialer.go

70 lines
1.8 KiB
Go

package prox5
import (
"context"
"errors"
"fmt"
"net"
"strconv"
"sync/atomic"
"h12.io/socks"
)
// DialContext is a simple stub adapter to implement a net.Dialer.
func (s *Swamp) DialContext(ctx context.Context, network, addr string) (net.Conn, error) {
return s.MysteryDialer(ctx, network, addr)
}
// DialContext is a simple stub adapter to implement a net.Dialer.
func (s *Swamp) Dial(network, addr string) (net.Conn, error) {
return s.DialContext(context.Background(), network, addr)
}
// MysteryDialer is a dialer function that will use a different proxy for every request.
func (s *Swamp) MysteryDialer(ctx context.Context, network, addr string) (net.Conn, error) {
var sock *Proxy
var socksString string
var conn net.Conn
var count int
// pull down proxies from channel until we get a proxy good enough for our spoiled asses
for {
max := s.GetDialerBailout()
if count > max {
return nil, errors.New("giving up after " + strconv.Itoa(max) + " tries")
}
if err := ctx.Err(); err != nil {
return nil, err
}
sock = s.GetAnySOCKS()
for !atomic.CompareAndSwapUint32(&sock.lock, stateUnlocked, stateLocked) {
if sock == nil {
break
}
randSleep()
}
var err error
if sock == nil {
continue
}
s.dbgPrint("dialer trying: " + sock.Endpoint + "...")
tout := ""
if s.GetServerTimeoutStr() != "-1" {
tout = fmt.Sprintf("?timeout=%ss", s.GetServerTimeoutStr())
}
socksString = fmt.Sprintf("socks%s://%s%s", sock.GetProto(), sock.Endpoint, tout)
atomic.StoreUint32(&sock.lock, stateUnlocked)
dialSocks := socks.Dial(socksString)
if conn, err = dialSocks(network, addr); err != nil {
count++
s.dbgPrint(ylw + "unable to reach [redacted] with " + socksString + ", cycling..." + rst)
continue
}
break
}
s.dbgPrint(grn + "MysteryDialer using socks: " + socksString + rst)
return conn, nil
}