/* shadowsocksproxy - GAppProxy / WallProxy client App for Android * Copyright (C) 2011 <max.c.lv@gmail.com> * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see <http://www.gnu.org/licenses/>. * * * ___====-_ _-====___ * _--^^^#####// \\#####^^^--_ * _-^##########// ( ) \\##########^-_ * -############// |\^^/| \\############- * _/############// (@::@) \\############\_ * /#############(( \\// ))#############\ * -###############\\ (oo) //###############- * -#################\\ / VV \ //#################- * -###################\\/ \//###################- * _#/|##########/\######( /\ )######/\##########|\#_ * |/ |#/\#/\#/\/ \#/\##\ | | /##/\#/ \/\#/\#/\#| \| * ` |/ V V ` V \#\| | | |/#/ V ' V V \| ' * ` ` ` ` / | | | | \ ' ' ' ' * ( | | | | ) * __\ | | | | /__ * (vvv(VVV)(VVV)vvv) * * HERE BE DRAGONS * */ package org.shadowsocks; import java.io.DataOutputStream; import java.lang.ref.WeakReference; import java.lang.reflect.InvocationTargetException; import java.lang.reflect.Method; import java.util.HashSet; import android.app.Notification; import android.app.NotificationManager; import android.app.PendingIntent; import android.app.Service; import android.appwidget.AppWidgetManager; import android.content.ComponentName; import android.content.Context; import android.content.Intent; import android.content.SharedPreferences; import android.content.SharedPreferences.Editor; import android.content.pm.PackageInfo; import android.content.pm.PackageManager; import android.media.AudioManager; import android.net.Uri; import android.os.Bundle; import android.os.Handler; import android.os.IBinder; import android.os.Message; import android.os.PowerManager; import android.preference.PreferenceManager; import android.util.Log; import android.widget.RemoteViews; public class ShadowsocksProxyService extends Service { private Notification notification; private NotificationManager notificationManager; private Intent intent; private PendingIntent pendIntent; private PowerManager.WakeLock mWakeLock; public static final String BASE = "/data/data/org.shadowsocks/"; private static final int MSG_CONNECT_START = 0; private static final int MSG_CONNECT_FINISH = 1; private static final int MSG_CONNECT_SUCCESS = 2; private static final int MSG_CONNECT_FAIL = 3; private static final int MSG_STOP_SELF = 5; final static String CMD_IPTABLES_RETURN = " -t nat -A OUTPUT -p tcp -d 0.0.0.0 -j RETURN\n"; final static String CMD_IPTABLES_REDIRECT_ADD_HTTP = " -t nat -A OUTPUT -p tcp " + "--dport 80 -j REDIRECT --to 8123\n"; final static String CMD_IPTABLES_REDIRECT_ADD_HTTPS = " -t nat -A OUTPUT -p tcp " + "--dport 443 -j REDIRECT --to 8123\n"; final static String CMD_IPTABLES_DNAT_ADD_HTTP = " -t nat -A OUTPUT -p tcp " + "--dport 80 -j DNAT --to-destination 127.0.0.1:8123\n"; final static String CMD_IPTABLES_DNAT_ADD_HTTPS = " -t nat -A OUTPUT -p tcp " + "--dport 443 -j DNAT --to-destination 127.0.0.1:8123\n"; private static final String TAG = "ShadowsocksProxyService"; public static volatile boolean statusLock = false; private Process httpProcess = null; private DataOutputStream httpOS = null; private String proxy; private String appMask = "0.0.0.0"; private String passwd; private DNSServer dnsServer = null; private int dnsPort = 8153; private SharedPreferences settings = null; private boolean hasRedirectSupport = true; private boolean isGlobalProxy = false; private ProxyedApp apps[]; private static final Class<?>[] mStartForegroundSignature = new Class[] { int.class, Notification.class }; private static final Class<?>[] mStopForegroundSignature = new Class[] { boolean.class }; private static final Class<?>[] mSetForegroundSignature = new Class[] { boolean.class }; private Method mSetForeground; private Method mStartForeground; private Method mStopForeground; private Object[] mSetForegroundArgs = new Object[1]; private Object[] mStartForegroundArgs = new Object[2]; private Object[] mStopForegroundArgs = new Object[1]; /* * This is a hack see * http://www.mail-archive.com/android-developers@googlegroups * .com/msg18298.html we are not really able to decide if the service was * started. So we remember a week reference to it. We set it if we are * running and clear it if we are stopped. If anything goes wrong, the * reference will hopefully vanish */ private static WeakReference<ShadowsocksProxyService> sRunningInstance = null; public final static boolean isServiceStarted() { final boolean isServiceStarted; if (sRunningInstance == null) { isServiceStarted = false; } else if (sRunningInstance.get() == null) { isServiceStarted = false; sRunningInstance = null; } else { isServiceStarted = true; } return isServiceStarted; } final Handler handler = new Handler() { @Override public void handleMessage(Message msg) { Editor ed = settings.edit(); switch (msg.what) { case MSG_CONNECT_START: ed.putBoolean("isConnecting", true); statusLock = true; PowerManager pm = (PowerManager) getSystemService(Context.POWER_SERVICE); mWakeLock = pm.newWakeLock(PowerManager.SCREEN_DIM_WAKE_LOCK | PowerManager.ON_AFTER_RELEASE, "ShadowsocksProxy"); mWakeLock.acquire(); break; case MSG_CONNECT_FINISH: ed.putBoolean("isConnecting", false); statusLock = false; if (mWakeLock != null && mWakeLock.isHeld()) mWakeLock.release(); break; case MSG_CONNECT_SUCCESS: ed.putBoolean("isRunning", true); break; case MSG_CONNECT_FAIL: ed.putBoolean("isRunning", false); break; case MSG_STOP_SELF: stopSelf(); break; } ed.commit(); super.handleMessage(msg); } }; private String port; private String remoteDnsPort; public boolean connect() { try { StringBuffer sb = new StringBuffer(); sb.append(BASE + "proxy.sh start " + proxy + " " + passwd + " " + port); final String cmd = sb.toString(); Log.e(TAG, cmd); Utils.log(TAG, "Before run command"); Utils.runRootCommand(cmd); Utils.log(TAG, "after run command"); } catch (Exception e) { Log.e(TAG, "Cannot connect"); return false; } return true; } private String getVersionName() { String version; try { PackageInfo pi = getPackageManager().getPackageInfo(getPackageName(), 0); version = pi.versionName; } catch (PackageManager.NameNotFoundException e) { version = "Package name not found"; } return version; } public void handleCommand(Intent intent) { Utils.log(TAG, "Service Start"); if (intent == null) { stopSelf(); return; } Bundle bundle = intent.getExtras(); if (bundle == null) { stopSelf(); return; } proxy = bundle.getString("proxy"); port = bundle.getString("port"); remoteDnsPort = bundle.getString(ShadowsocksProxy.SETTING_REMOTEDNS); passwd = bundle.getString("passwd"); isGlobalProxy = bundle.getBoolean("isGlobalProxy"); Log.e(TAG, "Proxy: " + proxy); Log.e(TAG, "Local Port: " + port); // APNManager.setAPNProxy("127.0.0.1", Integer.toString(port), this); new Thread(new Runnable() { @Override public void run() { handler.sendEmptyMessage(MSG_CONNECT_START); Log.d(TAG, "IPTABLES: " + Utils.getIptables()); // Test for Redirect Support hasRedirectSupport = Utils.getHasRedirectSupport(); if (handleConnection()) { // Connection and forward successful notifyAlert(getString(R.string.forward_success), getString(R.string.service_running)); handler.sendEmptyMessageDelayed(MSG_CONNECT_SUCCESS, 500); // for widget, maybe exception here try { RemoteViews views = new RemoteViews(getPackageName(), R.layout.shadowsocksproxy_appwidget); views.setImageViewResource(R.id.serviceToggle, R.drawable.on); AppWidgetManager awm = AppWidgetManager .getInstance(ShadowsocksProxyService.this); awm.updateAppWidget(awm .getAppWidgetIds(new ComponentName(ShadowsocksProxyService.this, ShadowsocksProxyWidgetProvider.class)), views); } catch (Exception ignore) { // Nothing } } else { // Connection or forward unsuccessful notifyAlert(getString(R.string.forward_fail), getString(R.string.service_failed)); stopSelf(); handler.sendEmptyMessageDelayed(MSG_CONNECT_FAIL, 500); } handler.sendEmptyMessageDelayed(MSG_CONNECT_FINISH, 500); } }).start(); markServiceStarted(); } /** Called when the activity is first created. */ public boolean handleConnection() { try { if (proxy.length() > 8) { String[] ips = proxy.split("\\."); if (ips.length == 4) appMask = ips[0] + "." + ips[1] + ".0.0"; Log.d(TAG, appMask); } } catch (Exception ignore) { return false; } Utils.log(TAG, "Before DNSServer"); // DNS Proxy Setup // with AsyncHttpClient dnsServer = new DNSServer(this, proxy, remoteDnsPort); dnsPort = dnsServer.getServPort(); Utils.log(TAG, "Before preConnection"); if (!preConnection()) return false; Utils.log(TAG, "after preConnection"); Thread dnsThread = new Thread(dnsServer); dnsThread.setDaemon(true); dnsThread.start(); Utils.log(TAG, "after DNSServer and before connect"); // yowachen:preconnection里面已经调用了,这个地方不需要在调用此命令 // connect(); Utils.log(TAG, "******after connect"); return true; } private void initSoundVibrateLights(Notification notification) { final String ringtone = settings.getString("settings_key_notif_ringtone", null); AudioManager audioManager = (AudioManager) this.getSystemService(Context.AUDIO_SERVICE); if (audioManager.getStreamVolume(AudioManager.STREAM_RING) == 0) { notification.sound = null; } else if (ringtone != null) notification.sound = Uri.parse(ringtone); else notification.defaults |= Notification.DEFAULT_SOUND; if (settings.getBoolean("settings_key_notif_vibrate", false)) { long[] vibrate = { 0, 30 }; notification.vibrate = vibrate; } notification.defaults |= Notification.DEFAULT_LIGHTS; } void invokeMethod(Method method, Object[] args) { try { method.invoke(this, mStartForegroundArgs); } catch (InvocationTargetException e) { // Should not happen. Log.w(TAG, "Unable to invoke method", e); } catch (IllegalAccessException e) { // Should not happen. Log.w(TAG, "Unable to invoke method", e); } } private void markServiceStarted() { sRunningInstance = new WeakReference<ShadowsocksProxyService>(this); } private void markServiceStopped() { sRunningInstance = null; } private void notifyAlert(String title, String info) { notification.icon = R.drawable.ic_stat_shadowsocksproxy; notification.tickerText = title; notification.flags = Notification.FLAG_ONGOING_EVENT; initSoundVibrateLights(notification); // notification.defaults = Notification.DEFAULT_SOUND; notification.setLatestEventInfo(this, getString(R.string.app_name), info, pendIntent); startForegroundCompat(1, notification); } private void notifyAlert(String title, String info, int flags) { notification.icon = R.drawable.ic_stat_shadowsocksproxy; notification.tickerText = title; notification.flags = flags; initSoundVibrateLights(notification); notification.setLatestEventInfo(this, getString(R.string.app_name), info, pendIntent); notificationManager.notify(0, notification); } @Override public IBinder onBind(Intent intent) { return null; } @Override public void onCreate() { super.onCreate(); settings = PreferenceManager.getDefaultSharedPreferences(this); notificationManager = (NotificationManager) this.getSystemService(NOTIFICATION_SERVICE); intent = new Intent(this, ShadowsocksProxy.class); intent.setFlags(Intent.FLAG_ACTIVITY_CLEAR_TOP); pendIntent = PendingIntent.getActivity(this, 0, intent, 0); notification = new Notification(); try { mStartForeground = getClass().getMethod("startForeground", mStartForegroundSignature); mStopForeground = getClass().getMethod("stopForeground", mStopForegroundSignature); } catch (NoSuchMethodException e) { // Running on an older platform. mStartForeground = mStopForeground = null; } try { mSetForeground = getClass().getMethod("setForeground", mSetForegroundSignature); } catch (NoSuchMethodException e) { throw new IllegalStateException( "OS doesn't have Service.startForeground OR Service.setForeground!"); } } /** Called when the activity is closed. */ @Override public void onDestroy() { statusLock = true; stopForegroundCompat(1); notifyAlert(getString(R.string.forward_stop), getString(R.string.service_stopped), Notification.FLAG_AUTO_CANCEL); try { if (httpOS != null) { httpOS.close(); httpOS = null; } if (httpProcess != null) { httpProcess.destroy(); httpProcess = null; } } catch (Exception e) { Log.e(TAG, "HTTP Server close unexpected"); } try { if (dnsServer != null) dnsServer.close(); } catch (Exception e) { Log.e(TAG, "DNS Server close unexpected"); } new Thread() { @Override public void run() { // Make sure the connection is closed, important here onDisconnect(); } }.start(); // for widget, maybe exception here try { RemoteViews views = new RemoteViews(getPackageName(), R.layout.shadowsocksproxy_appwidget); views.setImageViewResource(R.id.serviceToggle, R.drawable.off); AppWidgetManager awm = AppWidgetManager.getInstance(this); awm.updateAppWidget(awm.getAppWidgetIds(new ComponentName(this, ShadowsocksProxyWidgetProvider.class)), views); } catch (Exception ignore) { // Nothing } Editor ed = settings.edit(); ed.putBoolean("isRunning", false); ed.putBoolean("isConnecting", false); ed.commit(); try { notificationManager.cancel(0); } catch (Exception ignore) { // Nothing } try { ProxySettings.resetProxy(this); } catch (Exception ignore) { // Nothing } // APNManager.clearAPNProxy("127.0.0.1", Integer.toString(port), this); super.onDestroy(); statusLock = false; markServiceStopped(); } private void onDisconnect() { Utils.runRootCommand(Utils.getIptables() + " -t nat -F OUTPUT"); if (Utils.isRoot()) Utils.runRootCommand(BASE + "proxy.sh stop"); else Utils.runCommand(BASE + "proxy.sh stop"); } // This is the old onStart method that will be called on the pre-2.0 // platform. On 2.0 or later we override onStartCommand() so this // method will not be called. @Override public void onStart(Intent intent, int startId) { handleCommand(intent); } @Override public int onStartCommand(Intent intent, int flags, int startId) { handleCommand(intent); // We want this service to continue running until it is explicitly // stopped, so return sticky. return START_STICKY; } /** * Internal method to request actual PTY terminal once we've finished * authentication. If called before authenticated, it will just fail. */ private boolean preConnection() { Utils.log(TAG, "Forward Successful"); Utils.runRootCommand(BASE + "proxy.sh start " + proxy + " " + passwd + " " + port); StringBuffer init_sb = new StringBuffer(); StringBuffer http_sb = new StringBuffer(); StringBuffer https_sb = new StringBuffer(); init_sb.append(Utils.getIptables() + " -t nat -F OUTPUT\n"); init_sb.append(Utils.getIptables() + " -t nat -A OUTPUT -p udp --dport 53 -j REDIRECT --to " + dnsPort + "\n"); String cmd_bypass = Utils.getIptables() + CMD_IPTABLES_RETURN; init_sb.append(cmd_bypass.replace("0.0.0.0", appMask + "/16")); init_sb.append(cmd_bypass.replace("-d 0.0.0.0", "-m owner --uid-owner " + getApplicationInfo().uid)); if (isGlobalProxy) { http_sb.append(hasRedirectSupport ? Utils.getIptables() + CMD_IPTABLES_REDIRECT_ADD_HTTP : Utils.getIptables() + CMD_IPTABLES_DNAT_ADD_HTTP); https_sb.append(hasRedirectSupport ? Utils.getIptables() + CMD_IPTABLES_REDIRECT_ADD_HTTPS : Utils.getIptables() + CMD_IPTABLES_DNAT_ADD_HTTPS); } else { // for proxy specified apps if (apps == null || apps.length <= 0) apps = AppManager.getProxyedApps(this); HashSet<Integer> uidSet = new HashSet<Integer>(); for (int i = 0; i < apps.length; i++) { if (apps[i].isProxyed()) { uidSet.add(apps[i].getUid()); } } for (int uid : uidSet) { http_sb.append((hasRedirectSupport ? Utils.getIptables() + CMD_IPTABLES_REDIRECT_ADD_HTTP : Utils.getIptables() + CMD_IPTABLES_DNAT_ADD_HTTP).replace("-t nat", "-t nat -m owner --uid-owner " + uid)); https_sb.append((hasRedirectSupport ? Utils.getIptables() + CMD_IPTABLES_REDIRECT_ADD_HTTPS : Utils.getIptables() + CMD_IPTABLES_DNAT_ADD_HTTPS).replace("-t nat", "-t nat -m owner --uid-owner " + uid)); } } String init_rules = init_sb.toString(); Utils.runRootCommand(init_rules, 30 * 1000); Utils.log(TAG, "init_rules:\r\n" + init_rules); String redt_rules = http_sb.toString(); redt_rules += https_sb.toString(); Utils.runRootCommand(redt_rules); Utils.log(TAG, "redt_rules:\r\n" + redt_rules); return true; } /** * This is a wrapper around the new startForeground method, using the older * APIs if it is not available. */ void startForegroundCompat(int id, Notification notification) { // If we have the new startForeground API, then use it. if (mStartForeground != null) { mStartForegroundArgs[0] = Integer.valueOf(id); mStartForegroundArgs[1] = notification; invokeMethod(mStartForeground, mStartForegroundArgs); return; } // Fall back on the old API. mSetForegroundArgs[0] = Boolean.TRUE; invokeMethod(mSetForeground, mSetForegroundArgs); notificationManager.notify(id, notification); } /** * This is a wrapper around the new stopForeground method, using the older * APIs if it is not available. */ void stopForegroundCompat(int id) { // If we have the new stopForeground API, then use it. if (mStopForeground != null) { mStopForegroundArgs[0] = Boolean.TRUE; try { mStopForeground.invoke(this, mStopForegroundArgs); } catch (InvocationTargetException e) { // Should not happen. Log.w(TAG, "Unable to invoke stopForeground", e); } catch (IllegalAccessException e) { // Should not happen. Log.w(TAG, "Unable to invoke stopForeground", e); } return; } // Fall back on the old API. Note to cancel BEFORE changing the // foreground state, since we could be killed at that point. notificationManager.cancel(id); mSetForegroundArgs[0] = Boolean.FALSE; invokeMethod(mSetForeground, mSetForegroundArgs); } }